text
string | id
string | dump
string | url
string | date
string | file_path
string | offset
int64 | token_count
int64 | language
string | page_average_lid
string | page_average_lid_score
float64 | full_doc_lid
string | full_doc_lid_score
float64 | per_page_languages
list | is_truncated
bool | extractor
string | page_ends
list |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Basics of Network Theory (Part-I)
1. A square waveform as shown in figure is applied across 1 mH ideal inductor. The current through the inductor is a ……. wave of …… peak amplitude.
[Gate 1987: 2 Marks]
Ans. The current through the inductor is 𝒊𝑳 = 𝟏 𝑳 ∫𝒗𝒅𝒕 𝒕 𝟎 . The integration of a square wave is a triangular wave so the current through the inductor is a triangular wave of 1 volt peak amplitude. Slope of triangular wave is ±2
2. Two 2H inductance coils are connected in series and are also magnetically coupled to each other the coefficient of coupling being 0.1. The total inductance of the combination can be
Ans. (d)
3.
The equivalent inductance 𝑳𝒆𝒒= 𝑳𝟏 + 𝑳𝟐 ± 𝟐𝑴
= 𝟐+ 𝟐± 𝟐× 𝟎. 𝟏√𝟐× 𝟐
𝑴= 𝑲√𝑳
𝟏
𝑳
𝟐
= 𝟒± 𝟎. 𝟒
= 𝟒. 𝟒, 𝟑. 𝟔
The current i
4
in the circuit of Figure is equal to
(a) 12 A
(c) 4 A
(b) -12 A
4. The Voltage V in Figure is equal to
(d) None of these
[Gate 1997: 1 Mark]
(a) 3 V
(c) 5 V
(b) -3 V
(d) None of these
[Gate 1997: 1 Mark]
Ans. (a)
Apply KVL
5. The voltage V in Figure is always equal to
(a) 9 V
(b) 5 V
(c) 1 V
(d) None of these
Since the voltage of 2A current source is not known, it is not possible to find the value of voltage V.
6. The voltage V in Figure is
[Gate 1997: 1 Mark]
Ans. (a)
7. In the circuit shown in the figure the current iD through the ideal diode (zero cut in voltage and zero forward resistance) equals
(a) 0 A
(c) 1 A
(b) 4 A
(d) None of these
[Gate 1997: 3 Marks]
Ans. (c)
Applying the source conversion
8. The voltage across the terminals a and b in Figure is
(a) 0.5 V
(c) 3.5 V
(b) 3.0 V
(d) 4.0 V
[Gate 1998: 1 Mark]
Ans. (c)
Taking b as reference node and applying KCL at a
𝑽
𝒂𝒃
−𝟏+ 𝑽
𝒂𝒃
= 𝟔
9. In the circuit of the figure, the voltage V(t) is
(a) e at - e bt
(c) ae at - be bt
(b) e at + e bt
(d) ae at + be bt
[Gate 2000: 1 Mark]
Ans. (d)
The voltage v(t) is
𝒗(𝒕) = 𝑳
𝒅
𝒅𝒕
(𝒆 + 𝒆)
= 𝒂𝒆
𝒂𝒕
+ 𝒃𝒆
𝒃𝒕
10. For the circuit in the figure, the voltage V0 is
(a) 2 V
(c) -1 V
(b) 1 V
(d) None of these
[Gate 2000: 2 Marks]
𝒂𝒕 𝒃𝒕
Ans. (d)
Since the diode is forward biased, it is taken as short circuit. Writing KCL
11. The voltage e0 in the figure is
[Gate 2001: 2 Marks]
12. The voltage e0 in the figure is
(a) 48 V
(c) 36 V
(b) 24 V
(d) 28 V
(d)
Applying the source conversion, the circuit is as shown
13. The dependent current source shown in the figure
Ans.
[Gate 2001: 2 Mark]
Ans.
(a) Delivers 80W
(b) absorbs 80 W
(a)
Writing KVL
Voltage across dependent source =20V
Thus power delivered by it is = 𝟐𝟎× 𝟐𝟎 𝟓 = 𝟖𝟎𝑾
14. The equivalent inductance measured between the terminals 1 and 2 for the circuit shown in the figure
(a) L1 + L2 + M
(c) L
1
+ L
2
+ 2M
(b) L
1
+ L
2
– M
(d) L
1
+ L
2
- 2M
[Gate 2004: 1 Mark]
Ans. (d)
The coils are wound in opposite directions, they are series opposing
𝑳𝒆𝒒= 𝑳
𝟏
+ 𝑳
𝟐
−𝟐𝑴
(c) delivers 40 W
(d) absorbs 40 W
[Gate 2002: 1 Mark]
15. Impedance Z as shown in the figure is
Ans. (b)
Current leaves the dotted terminal of L1 and enters the dotted terminal of L3 so mutual induction M13 is negative, M23 is positive.
16. If R1 = R2 = R4 = R and R3 = 1.1R in the bridge circuit shown in the figure, then the reading in the ideal voltmeter connected between a and b is
(a) 0.238 V
(c) -0.238 V
(b) 0.138 V
(d) 1 V
[Gate 2005: 2 Marks]
17. In the circuit shown, the power supply by the voltage source is
(a) 0 W
(b) 5 W
(a)
Applying KVL in the outer loop
(c) 10 W
(d) 100 W
[Gate 2010: 2 Marks]
Ans.
Power supplied by the voltage source 𝑷= 𝑽𝑰= 𝟎
18. In the circuit shown below, the current I is equal to
(a) 1.4 ∠0 0 A
(c) 2.8∠0 0 A
(b) 2.0∠0 0 A
(d) 3.2∠0 0 A
[Gate 2011: 2 Marks]
Ans. (b)
Converting delta into star the circuit is redrawn as impedance of the circuit is
19. The average power delivered to an impedance (4 – j3)Ω by a current 5 cos (100πt + 100)
A is
(a) 44.2 W
(b) 50 W
Ans. (b)
Average power is same as rms power
20. In the circuit shown below, the current through the inductor is
(a) 2 1+𝑗 𝐴
(b) −1 1+𝑗 𝐴
(c) 1 1+𝑗 𝐴
(d) 0 A
(c) 62.5 W
(d) 125 W
[Gate 2012: 1 Mark]
[Gate 2012: 1 Mark]
Ans. (C)
In the balanced bridge, the product of opposite arms are equal.
In the balanced bridge, current flowing through the diagonal element is zero.
Applying nodal analysis at top node
21. Consider a delta connection of resistors and its equivalent star connection as shown below. If all elements of the delta connection are scaled by a factor k, k> 0, the elements of the corresponding star equivalent will be scaled by a factor of
(a) K 2
(b) K
(b)
In the star connection,
𝑹
𝑹 𝑹
𝒄
=
𝒃 𝒂
𝑹
𝒂
+𝑹
𝒃
+𝑹
𝒄
, 𝑹
𝑩
=
𝑹
𝒂
𝑹
𝒂
𝑹 +𝑹
𝒄
𝒃
+𝑹
𝒄
If the delta connection components are scaled by a factor K, then the star equivalent will also be scaled by a factor K
(c) 1/K
(d) √𝐾
Ans.
[Gate 2013: 1 Mark]
22. Find the current I in the following branch
[Gate:2014]
Ans. Using superposition taking 10V source and replacing the current source by its internal resistance (∞)
Taking current source and replacing voltage source by its internal resistance zero
Total current 𝑰= 𝟏 𝟐 + 𝟏 𝟒 = 𝟎. 𝟕𝟓𝑨
23. A series RC circuit is connected to DC voltage source at time t0=0. The relation between the source voltage Vs, the resistance R, the capacitance C, the current i(t) is below:
Ans.
Which one of the following i(t) represents
(a)
Given
𝑽
At t = 0 DC source Vs is connected to the RC series network.
Since there is no charge on capacitor initially so, at t = 0 it acts like a short circuit and the current through the network is
then as the capacitor starts charging current starts decreasing at the rate the capacitor starts charging
[Gate:2014]
|
<urn:uuid:9c16425c-ff1a-43a5-b08b-a6218b607303>
|
CC-MAIN-2021-21
|
http://www.gatestudy.com/wp-content/uploads/2014/05/Basics-of-Network-Theory-Part-I.pdf
|
2021-05-11T00:51:43+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-21/subset=warc/part-00126-2bb1ba05-1421-4b90-a3f4-bbc46b4a29a5.c000.gz.parquet
| 72,269,227
| 2,196
|
eng_Latn
|
eng_Latn
| 0.619437
|
eng_Latn
| 0.893939
|
[
"eng_Latn",
"eng_Latn",
"slv_Latn",
"eng_Latn",
"eng_Latn",
"mlt_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"slv_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
632,
908,
1083,
1448,
1692,
2039,
2186,
2403,
2924,
3329,
3500,
3778,
4195,
4852,
5323,
5700
] |
Name
Vorname
Straße
PLZ / Ort
Telefon
Mobil
E-Mail
Geb.-Datum
Hiermit beantrage ich die Spenden-/ordentliche Mitgliedschaft im Förderverein Grevenbroicher Baseball und Softball e. V. für mich und folgende Personen:
Name
Vorname Straße
PLZ / Ort
Geb.-Datum
Der Jahresbeitrag beträgt für
(Gewünschten Mitgliedsbeitrag bitte ankreuzen)
Familien mit Kindern unter 18 Jahre
65,00 €
Einzelpersonen
50,00 €
______________________________________________________________________________________
Einmalige Spende: €
______________________________________________________________________________________
Datum/Ort: ,
Unterschrift: ____________________________
______________________________________________________________________________________
Hiermit bevollmächtige ich den Förderverein Grevenbroicher Baseball und Softball e. V., den Jahresbeitrag / die Spende von meinem Konto abzubuchen.
IBAN
Konto-Nummer
Name der Bank
Bankleitzahl
Datum/Ort: ,
Unterschrift: ____________________________
______________________________________________________________________________________
|
<urn:uuid:92e9a7dd-c7c1-485e-bb53-10d1fbe74922>
|
CC-MAIN-2018-51
|
http://kapellen-turtles.de/fileadmin/user_upload/Antrag_zur_Mitgliedschaft_im_FGB_2017.pdf
|
2018-12-17T00:48:32Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828018.77/warc/CC-MAIN-20181216234902-20181217020902-00053.warc.gz
| 158,471,330
| 251
|
eng_Latn
|
eng_Latn
| 0.445273
|
eng_Latn
| 0.445273
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
1132
] |
Correlation between nucleated red blood cells and pulse oxygen saturation in neonatal asphyxia
Gatot Irawan Sarosa, Farid A. Rahmadi, Muhammad Sholeh Kosim, Kamilah B. Rahardjani
Abstract
Background Neonatal asphyxia is the major cause of neonatal death at a rate of approximately 23%. The incidence of asphyxia is higher in developing countries, due to limited availability of perinatology facilities. Hypoxia due to asphyxia is characterized by low pulse oxygen saturation (SpO₂), which basic health care facilities are unable to monitor. The number of nucleated red blood cells (nRBCs) in asphyxia increases in order to compensate for the hypoxia. Few studies have reported on nRBCs as they relate to pulse oxygen saturation in neonatal asphyxia.
Objective To assess for a correlation between nRBCs and pulse oxygen saturation in neonatal asphyxia.
Methods In this cross-sectional study, asphyxia was assessed by way of Apgar scores; pulse oxygen saturation was monitored by pulse oximetry; and nRBCs were determined by blood smears. Statistical analysis used was Spearman’s test.
Results Subjects were 41 neonates with asphyxia, 15 of whom had 5th minute Apgar scores ≤ 6. Subjects with Apgar scores ≤ 6 had significantly higher umbilical venous nRBC counts [20.0 (SD 13.6) /100 white blood cell] than subjects with Apgar scores > 6 [8.81 (SD 8.71) /100 white blood cell]; (P = 0.004). Subjects with Apgar ≤ 6 had significantly lower 5th minute SpO₂ values [76.46 (SD 6.17) %] than subjects with Apgar scores > 6 [87.03 (SD 6.29)]; (P<0.0001). Spearman’s test revealed a significant correlation between higher nRBC counts and lower pulse oxygen saturation (r = -0.804; P<0.001).
Conclusion In asphyxia neonatorum there is a correlation between umbilical vein nRBC count and the 5th minute SpO₂. As such, we recommend using nRBC examinations to predict pulse oxygen saturation as a means to assess the severity of hypoxia in peripheral areas where pulse oximetry machines may be unavailable. [Paediatr Indones. 2014;54:314-7.]
Keywords: nRBC, pulse oxygen saturation, asphyxia
Neonatal asphyxia is the major cause of neonatal deaths, more than infection and prematurity. Approximately 23% of neonatal deaths are caused by asphyxia. The incidence of asphyxia is 1-1.5% and correlates with gestational age and birth weight. The incidence is higher in developing countries due to the limited availability of antenatal and perinatal facilities.
Asphyxia is defined as spontaneous and regular respiratory failure within a short time after birth. Hypoxia, hypercapnea, and acidosis are characteristics of asphyxia that may cause circulatory disturbances. Hypoxia leads to multiple organ failure and death, if not well treated. Oxygen saturation describes the percentage of hemoglobin binding sites in the bloodstream occupied by oxygen. Hypoxia in asphyxia can be manifested as low oxygen saturation. Pulse oxygen saturation (SpO₂) is measured non-invasively using pulse oximetry. Pulse oximetry results can be influenced by intravascular volume, vasoconstriction, environmental lightning, and movement of the extremity to which the probe is attached.
From the Department of Child Health, Diponegoro University Medical School/Dr. Kariadi Hospital Semarang, Indonesia.
Reprint requests to: Dr. Farid Agung Rahmadi, Department of Child Health, Diponegoro University Medical School/Dr. Kariadi Hospital, Jl. Dr. Sutomo 16, Semarang, Indonesia. E-mail: [email protected].
Nucleated red blood cells (nRBC) are immature red blood cells that have nuclei and circulate in the bloodstream. The number of nRBCs varies in healthy term infants, but is generally not more than 10/100 white blood cells (WBC). In hypoxia, the number of nRBCs increases through an erythropoietin-mediated mechanism to compensate for oxygen demand.\(^9\)
Newborn SpO\(_2\) measurements using pulse oximetry cannot be done in health care centers with limited facilities. However, bloodsmear examinations for nRBC measurements are simple and can be done even in limited health facilities.\(^8\) Few studies have been done on nRBC and oxygen saturation. The aim of this study was to assess for a correlation between nRBC and peripheral oxygen saturation in neonatal asphyxia.
**Methods**
This cross-sectional study was conducted in Dr Kariadi Hospital from September 2012 to January 2013. The study was approved by the Medical Research Ethics Committee of Diponegoro University/Dr. Kariadi Hospital in Semarang.
Consecutive sampling was conducted to obtain our 41 neonates. The inclusion criteria were moderate or severe asphyxia, gestational age ≥ 35 weeks, and without hypothermia, hypovolemic shock, or intrauterine growth restriction (IUGR). Subjects had Hb > 12.0 g/dL, WBC 5,000-25,000/mm\(^3\), and mothers who did not smoke, or had diabetes, anemia, leukemia, chorioamnionitis, or antepartum bleeding. Exclusion criteria were ABO or rhesus incompatibility and cyanotic congenital heart disease.
Subjects underwent SpO\(_2\) measurements at the 5\(^{th}\) minute. Umbilical venous bloodsmears was performed to measure nRBCs soon after birth. A clinical pathologist examined the nRBCs and was blinded to subjects’ SpO\(_2\) values.
Independent sample T-test was used to assess for differences in nRBC counts between subjects with 5\(^{th}\) minute Apgar scores ≤ 6 and > 6. Spearman’s test was used to assess for a correlation between nRBC counts and 5\(^{th}\) minute SpO\(_2\). Statistical analysis was done with a computer program.
**Results**
From 62 newborns with asphyxia, 41 neonates fulfilled the inclusion criteria. Subjects consisted of 18 (43.9%) males, and 9 (22.0%) underwent vaginal, unassisted deliveries. Subjects’ mean birth weight was 2,635.36 (SD 554.25) grams. There were 15 (36.6%) subjects with Apgar scores ≤ 6 and 26 (63.4%) subjects
| Table 1. Characteristics of subjects |
|--------------------------------------|
| Characteristics | n=41 |
| Gender, n (%) | |
| Male | 18 (43.9) |
| Female | 23 (56.1) |
| Mode of delivery, n (%) | |
| Vaginal, unassisted | 9 (22) |
| Assisted | 32 (78) |
| Median gestational age (range), weeks| 37 (35-41) |
| Mean birth weight (SD), grams | 2,635.36 (554.25) |
| 5\(^{th}\) minute Apgar score, n (%) | |
| ≤6 | 15 (36.6) |
| >6 | 26 (63.4) |
| Table 2. Subjects’ characteristics based on 5\(^{th}\) minute Apgar scores |
|--------------------------------------------------------------------------|
| Characteristics | Apgar ≤ 6 (n=15) | Apgar > 6 (n=26) | P value |
| Gender, n | | | |
| Male | 6 | 12 | 0.702\(^a\) |
| Female | 9 | 14 | |
| Mode of delivery, n | | | |
| Vaginal, unassisted | 3 | 6 | 1.000 \(^b\) |
| Assisted | 12 | 20 | |
| Mean gestational age (SD), weeks | 37.00 (1.69) | 36.57 (1.39) | 0.465\(^c\) |
| Mean maternal Hb (SD), g/dL | 11.65 (0.52) | 11.89 (0.93) | 0.297\(^d\) |
| Mean maternal WBC (SD), /mm\(^3\) | 13,745 (3,540) | 12,200 (3,807) | 0.158\(^e\) |
| Mean birth weight (SD), grams | 2,678 (501) | 2,611 (373) | 0.723\(^f\) |
| Mean maternal Hb (SD), g/dL | 13.86 (1.51) | 13.92 (1.23) | 0.695\(^g\) |
| Mean newborn WBC (SD), /mm\(^3\) | 15,220 (6342) | 15,248 (5,707) | 0.987 \(^h\) |
| Mean nRBC (SD), /100 WBC | 20.00 (13.09) | 8.81 (8.71) | 0.004 \(^i\) |
| Mean SpO\(_2\) (SD), % | 76.46 (6.17) | 87.03 (6.29) | <0.0001\(^j\) |
\(^a\) Chi square test, \(^b\) Fischer’s exact test, \(^c\) Mann Whitney test, \(^d\) Independent sample T-test
with Apgar scores > 6. Subjects’ characteristics are described in Table 1.
Subjects were divided into two groups based on their 5th minute Apgar scores: Apgar scores ≤ 6 (n=15) and > 6 (n=26). There were no significant differences in gender, delivery method, gestational age, maternal Hb values, maternal WBC counts, newborn Hb values, and newborn WBC counts between the two groups. Subjects with Apgar scores ≤ 6 had significantly higher umbilical venous nRBC counts [20 (SD 13.09) /100 WBC] than subjects with Apgar scores > 6 [8.81 (SD 8.71) /100 WBC]; (P = 0.004). Subjects with Apgar scores ≤ 6 had significantly lower 5th minute SpO₂ values [76.46 (SD 6.17) %] than subjects with Apgar scores > 6 [87.03 (SD 6.29) %]; (P < 0.0001) (Table 2).
Spearman’s correlation test revealed a significant correlation between nRBC and SpO₂ (r = -0.804; P=0.0001). The nRBC count distribution with regards to SpO₂ is shown in Figure 1.
**Discussion**
We included 41 neonates during the study period from September 2012 to January 2013. The subjects were similar to those in a study by Dawson et al. who found SpO₂ reference values in newborns with mean birth weight of 2,970 (SD 918) grams and mean gestational age of 38 (SD 4) weeks.\textsuperscript{10} We did not exclude ≥ 35 week-preterm infants, due to the small number of newborns with asphyxia during the study period and the subjectivity of the first day of last menstrual period calculation, New Ballard score examination, and there were no significant differences in hematology results between late-preterm and fullterm newborns.\textsuperscript{11} Low birth weight newborns were also not excluded due to the majority of preterm infants had birth weight < 2,500 grams, but we excluded those with IUGR.
We found no significant difference in maternal WBC counts between subjects with 5th minute Apgar scores of ≤ 6 and > 6. We excluded newborns from mothers with higher than normal WBC counts due to the effect of infection and leukocytosis in nRBC calculations.\textsuperscript{8,12} Only newborns with normal Hb values were included in this study, in order to minimize the effect of anemia on nRBC and SpO₂ values.\textsuperscript{8,13} There were no differences in Hb values between groups with 5th minute Apgar score ≤ 6 and > 6. Newborns with higher or lower than normal WBC counts were also excluded due to leukocytosis or leukopenia, and the effect of newborn infections on nRBC calculations.\textsuperscript{8,14} There were no differences in WBC counts between the Apgar score ≤ 6 and > 6 groups.
Subjects with the 5th minute Apgar scores ≤ 6 had higher nRBC counts than subjects with the 5th minute Apgar scores > 6. A previous study found that increased nRBC count correlated with acidosis severity and low Apgar score.\textsuperscript{15} Another study also found a negative, strong correlation between nRBC and 1st minute Apgar score and umbilical artery pH.\textsuperscript{16,17} Neonates with 5th minute Apgar scores...
had significantly lower SpO₂ values than they with 5th minute Apgar scores > 6. A study compared SpO₂ in 90 neonates with asphyxia and 30 control found that the 3rd and the 5th minute SpO₂ levels in neonates with asphyxia were lower compared to the controls. We found a strong correlation between increased nRBC count and low SpO₂ due to hypoxia. A study found that increased nRBC counts can be caused by acute or chronic hypoxia, which induces erythropoiesis and the release of erythrocytes and nRBC from the bone marrow to circulation. A previous study found increased nRBC counts in newborns with Apgar scores ≤6, another study found a correlation between nRBC count with low 1st minute Apgar scores and the severity of asphyxia.
A limitation of our study was that we did not exclude late and preterm newborns, due to the small number of newborns with asphyxia during the study period. Also, the nRBC count was performed by only one expert. (KAPPA test was not done in this study.)
In conclusion, there is a significant inverse correlation between umbilical vein nRBC counts and the 5th minute SpO₂ in asphyxia neonatorum. Nucleated RBC counts in newborns with 5th minute Apgar scores of ≤ 6 are higher compared to newborns with the 5th minute Apgar scores of > 6. As such, umbilical vein nRBC counts can be performed in newborns with asphyxia to predict SpO₂ and the severity of hypoxia in rural areas with limited access to oxygen saturation monitor.
References
1. Manas V, Amir I. Gangguan fungsi multi organ pada bayi asfikia berat. Sari Pediatri. 2005;5:72-8.
2. Gomella TL. Perinatal asphyxia. In: Gomella TL, Cunningham MD, Eyal FG, editors. Neonatology: Management, procedures, on-call problems, diseases, and drugs, 6th ed. New York: McGraw-Hill; 2009, p. 624-35.
3. Kosim MS. Gangguan napas pada bayi baru lahir. In: Kosim MS, Yunanto A, Dewi R, Sarosa G, Usman A, editors. Buku ajar neonatologi. Jakarta: IDAI; 2008, p. 126-45.
4. Lee AC, Mullany LC, Tielisch JM, Katz J, Khattri SK, LeClerq SC, et al. Risk factors for neonatal mortality due to birth asphyxia in southern Nepal: a prospective, community-based cohort study. Pediatrics. 2008;121:1381-90.
5. Aminullah A. Konsekuensi kelayakan sistemik berbagai organ tubuh akibat hipoksia dan ischemia neonatus. In: Suradi R, Monfrja H, Kusumowardhani D, editors. Penanganan mutakhir bayi prematur: membenahi kebutuhan bayi prematur untuk menunjang peningkatan kualitas sumber daya manusia naskah lengkap pendidikan kedokteran berkelanjutan Ilmu Kesehatan Anak FKUI XXXVIII. Jakarta: Balai Penerbit FKUI; 1997, p. 165-84.
6. Dharmasariwani N. Asfikia dan resusitasi bayi baru lahir. In: Kosim MS, Yunanto A, Dewi R, Sarosa G, Usman A, editors. Buku ajar neonatologi. Jakarta: IDAI; 2008, p. 103-25.
7. WHO. Pulse oximetry training manual. Geneva: WHO Press; 2011, p.13.
8. Hermansen MC. Nucleated red blood cells in the fetus and newborn. Arch Dis Child Fetal Neonatal 2001;84:F211-F5.
9. Dollberg S, Fainaru O, Mimouni FB, Shenhav M, Lessing BJ, Kupferminc M. Effect of passive smoking in pregnancy on neonatal nucleated red blood cells. Pediatrics. 2000;106:e34.
10. Dawson JA, Kamlin CO, Vento M, Wong C, Cole TJ, Donath SM, et al. Defining the reference range for oxygen saturation for infants after birth. Pediatrics. 2010;125:e1340-7.
11. Mehdi G, Russo FM, Samia A, Serra G, Bologna R, Mussap M, et al. Reference values of blood cell counts in the first days of life. Front Biosci. 2011;3:871-8.
12. Saracoglu F, Sahin I, Eser E, Gol K, Turkkanli B. Nucleated red blood cells as a marker in acute and chronic fetal asphyxia. Int J Gynaecol Obstet. 2000;71:113-8.
13. Severinghaus JW, Koh SO. Effect of anemia on pulse oximeter accuracy at low saturation. J Clin Monit. 1990;6:85-8.
14. Szwajewska M, Kalinka J, Krajewski P. Nucleated red blood cells (nRBC) as an auxiliary marker of intrauterine infection. J Pediatr Neonatol. 2005;2:15-8.
15. Hanlon-Lundberg KM, Kirby RS. Nucleated red blood cells as a marker of acidemia in term neonates. Am J Obstet Gynecol. 1999;181:196-201.
16. Sikarwar S, Gupta S. The correlation of clinical perinatal asphyxia with counts of nrbc/100 wbc in cord blood. WebmedCentral Obstetrics and Gynaecology 2011;2(1): WMC201511. doi: 10.9754/journal.wmc.2011.001511.
17. Boskabadi H, Maamouri G, Sadeghian MH, Ghayour-Mobarhan M, Heidarzade M, Shakeri MT, et al. Early diagnosis of perinatal asphyxia by nucleated red blood cell count: a case-control study. Arch Iran Med. 2010;13:275-81.
18. Rao R, Ramji S. Pulse oximetry in asphyxiated newborns in the delivery room. Indian Pediatr. 2001;38:762-6.
19. Papa D, Jyotsna P, Ashok BB. Cord blood nucleated red blood cell count - a marker of fetal asphyxia. J Obstet Gynecol India. 2008;58:45-8.
|
<urn:uuid:9cc256b9-7384-4077-a37e-a792bf371dad>
|
CC-MAIN-2020-40
|
http://download.garuda.ristekdikti.go.id/article.php?article=1475202&val=10268&title=CORRELATION%20BETWEEN%20NUCLEATED%20RED%20BLOOD%20CELLS%20AND%20PULSE%20OXYGEN%20SATURATION%20IN%20NEONATAL%20ASPHYXIA
|
2020-09-24T19:31:40+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-40/subset=warc/part-00131-50bb8e61-7c5b-4d2c-bd34-dad6ca92b697.c000.gz.parquet
| 44,113,344
| 4,508
|
eng_Latn
|
eng_Latn
| 0.936243
|
eng_Latn
| 0.967738
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
3481,
8177,
11171,
15921
] |
Before Starting the Project Application
To ensure that the Project Application is completed accurately, ALL project applicants should review the following information BEFORE beginning the application.
Things to Remember:
- Additional training resources can be found on the HUD Exchange at
- Project applicants are required to have a Data Universal Numbering System (DUNS) number and an active registration in the Central Contractor Registration (CCR)/System for Award Management (SAM) in order to apply for funding under the Fiscal Year (FY) 2018 Continuum of Care (CoC) Program Competition. For more information see FY 2018 CoC Program Competition NOFA.
https://www.hudexchange.info/e-snaps/guides/coc-program-competition-resources. - Program policy questions and problems related to completing the application in e-snaps may be directed to HUD the HUD Exchange Ask A Question.
- To ensure that applications are considered for funding, applicants should read all sections of the FY 2018 CoC Program NOFA and the FY 2018 General Section NOFA.
- New projects may only be submitted as either Reallocated or Permanent Supportive Housing Bonus Projects. These funding methods are determined in collaboration with local CoC and it is critical that applicants indicate the correct funding method. Project applicants must communicate with their CoC to make sure that the CoC submissions reflect the same funding method.
- Detailed instructions can be found on the left menu within e-snaps. They contain more comprehensive instructions and so should be used in tandem with onscreen text and the hide/show instructions found on each individual screen.
- Before completing the project application, all project applicants must complete or update (as applicable) the Project Applicant Profile in e-snaps.
- HUD reserves the right to reduce or reject any new project that fails to adhere to (24 CFR part 578 and application requirements set forth in FY 2018 CoC Program Competition NOFA.
1A. SF-424 Application Type
1. Type of Submission:
2. Type of Application: New Project Application
If Revision, select appropriate letter(s):
If "Other", specify:
3. Date Received:
4. Applicant Identifier:
5a. Federal Entity Identifier:
6. Date Received by State:
7. State Application Identifier:
1B. SF-424 Legal Applicant
8. Applicant a. Legal Name: .
b. Employer/Taxpayer Identification Number (EIN/TIN):
New Project Application FY2018
Page 1
c. Organizational DUNS:
PLUS 4:
d. Address
Street 1:
Street 2:
City:
County:
State:
Country:
Zip / Postal Code:
e. Organizational Unit (optional)
Department Name:
Division Name:
f. Name and contact information of person to
be
contacted on matters involving this
application
Prefix:
First Name:
Middle Name:
Last Name:
Suffix:
Title:
Organizational Affiliation:
Telephone Number:
Project:
Extension:
Fax Number:
Email:
New Project Application FY2018
Page 1
Fax Number:
Email:
1C. SF-424 Application Details
New Project Application FY2018
Page 1
9. Type of Applicant:
10. Name of Federal Agency:
11. Catalog of Federal Domestic Assistance
Title:
CFDA Number:
12. Funding Opportunity Number:
Title:
13. Competition Identification Number:
Title:
1D. SF-424 Congressional District(s)
```
14. Area(s) affected by the project (state(s) only): (for multiple selections hold CTRL key) 15. Descriptive Title of Applicant's Project: 16. Congressional District(s): a. Applicant: b. Project: (for multiple selections hold CTRL key) 17. Proposed Project a. Start Date: b. End Date: 18. Estimated Funding ($) a. Federal: b. Applicant: c. State: d. Local: e. Other: f. Program Income: g. Total:
```
1E. SF-424 Compliance
19. Is the Application Subject to Review By State Executive Order 12372 Process?
If "YES", enter the date this application was made available to the State for review:
20. Is the Applicant delinquent on any Federal debt?
If "YES," provide an explanation:
1F. SF-424 Declaration
By signing and submitting this application, I certify (1) to the statements contained in the list of certifications** and (2) that the statements herein are true, complete, and accurate to the best of my knowledge. I also provide the required assurances** and agree to comply with any resulting terms if I accept an award. I am aware that any false, fictitious, or fraudulent statements or claims may subject me to criminal, civil, or administrative penalties. (U.S. Code, Title 218, Section 1001)
New Project Application FY2018
Page 1
I AGREE:
21. Authorized Representative
Prefix:
First Name:
Middle Name:
Last Name:
Suffix:
Title:
Telephone Number:
(Format: 123-456-7890)
Fax Number:
(Format: 123-456-7890)
Email:
Signature of Authorized Representative:
Date Signed:
1G. HUD 2880
Applicant/Recipient Disclosure/Update Report - Form 2880 U.S. Department of Housing and Urban Development OMB Approval No. 2510-0011 (exp.11/30/2018)
Applicant/Recipient Information
1. Applicant/Recipient Name, Address, and Phone
Agency Legal Name:
Prefix:
First Name:
Middle Name:
Last Name:
Suffix:
Title:
Organizational Affiliation:
Telephone Number:
Extension:
Email:
City:
County:
State:
Country:
Zip/Postal Code:
2. Employer ID Number (EIN):
3. HUD Program:
4. Amount of HUD Assistance
Requested/Received:
New Project Application FY2018
Project:
(Requested amounts will be automatically entered within applications)
New Project Application FY2018
Page 1
5. State the name and location (street address, City and State) of the project or activity.
Refer to project name, addresses and CoC Project Identifying Number (PIN) entered into the attached project application.
Part I Threshold Determinations
1. Are you applying for assistance for a specific project or activity? (For further information, see 24 CFR Sec. 4.3).
2. Have you received or do you expect to receive assistance within the jurisdiction of the Department (HUD), involving the project or activity in this application, in excess of $200,000 during this fiscal year (Oct. 1 - Sep. 30)? For further information, see 24 CFR Sec. 4.9.
Certification
Warning: If you knowingly make a false statement on this form, you may be subject to civil or criminal penalties under Section 1001 of Title 18 of the United States Code. In addition, any person who knowingly and materially violates any required disclosures of information, including intentional nondisclosure, is subject to civil money penalty not to exceed $10,000 for each violation.
I certify that this information is true and complete.
I AGREE:
Name / Title of Authorized Official:
Signature of Authorized Official:
Date Signed:
1H. HUD 50070
HUD 50070 Certification for a Drug Free Workplace
Applicant Name:
Program/Activity Receiving Federal Grant
Funding:
Acting on behalf of the above named Applicant as its Authorized Official, I make the following certifications and agreements to the Department of Housing and Urban Development (HUD) regarding the sites listed below:
I certify that the above named Applicant will or will continue to provide a drug-free workplace by:
| a. | Publishing a statement notifying employees that the unlawful manufacture, distribution, dispensing, possession, or use of a controlled substance is prohibited in the Applicant's workplace and specifying the actions that will be taken against employees for violation of such prohibition. | e. | Notifying the agency in writing, within ten calendar days after receiving notice under subparagraph d.(2) from an employee or otherwise receiving actual notice of such conviction. Employers of convicted employees must provide notice, including position title, to every grant officer or other designee on whose grant activity the convicted employee was working, unless the Federalagency has designated a central point for the receipt of such notices. Notice shall include the identification number(s) of each affected grant; |
|---|---|---|---|
| b. | Establishing an on-going drug-free awareness program to inform employees --- (1) The dangers of drug abuse in the workplace (2) The Applicant's policy of maintaining a drug-free workplace; (3) Any available drug counseling, rehabilitation, and employee assistance programs; and (4) The penalties that may be imposed upon employees for drug abuse violations occurring in the workplace. | f. | Taking one of the following actions, within 30 calendar days of receiving notice under subparagraph d.(2), with respect to any employee who is so convicted --- (1) Taking appropriate personnel action against such an employee, up to and including termination, consistent with the requirements of the Rehabilitation Act of 1973, as amended; or (2) Requiring such employee to participate satisfactorily in a drug abuse assistance or rehabilitation program approved for such purposes by a Federal, State, or local health, law enforcement, or other appropriate agency; |
| c. | Making it a requirement that each employee to be engaged in the performance of the grant be given a copy of the statement required by paragraph a.; | g. | Making a good faith effort to continue to maintain a drugfree workplace through implementation of paragraphs a. thru f. |
| d. | Notifying the employee in the statement required by paragraph a. that, as a condition of employment under the grant, the employee will --- (1) Abide by the terms of the statement; and (2) Notify the employer in writing of his or her conviction for a violation of a criminal drug statute occurring in the workplace no later than five calendar days after such conviction; | | |
2. Sites for Work Performance.
The Applicant shall list (on separate pages) the site(s) for the performance of work done in connection with the HUD funding of the program/activity shown above: Place of Performance shall include the street address, city, county, State, and zip code. Identify each sheet with the Applicant name and address and the program/activity receiving grant funding.) Workplaces, including addresses, entered in the attached project application.
Refer to addresses entered into the attached project application.
I hereby certify that all the information stated herein, as well as any information provided in
X
New Project Application FY2018
Page 11
Project:
the accompaniment herewith, is true and accurate.
New Project Application FY2018
Page 12
Warning: HUD will prosecute false claims and statements. Conviction may result in criminal and/or civil penalties. (18 U.S.C. 1001, 1010, 1012; 31 U.S.C. 3729, 3802)
Authorized Representative
Prefix:
First Name:
Middle Name
Last Name:
Suffix:
Title:
Telephone Number:
(Format: 123-456-7890)
Fax Number: (Format: 123-456-7890)
Email:
Signature of Authorized Representative:
Date Signed:
CERTIFICATION REGARDING LOBBYING
Certification for Contracts, Grants, Loans, and Cooperative Agreements
The undersigned certifies, to the best of his or her knowledge and belief, that:
(1) No Federal appropriated funds have been paid or will be paid, by or on behalf of the undersigned, to any person for influencing or attempting to influence an officer or employee of an agency, a Member of Congress, an officer or employee of Congress, or an employee of a Member of Congress in connection with the awarding of any Federal contract, the making of any Federal grant, the making of any Federal loan, the entering into of any cooperative agreement, and the extension, continuation, renewal, amendment, or modification of any Federal contract, grant, loan, or cooperative agreement.
2) If any funds other than Federal appropriated funds have been paid or will be paid to any person for influencing or attempting to influence an officer or employee of any agency, a Member of Congress, an officer or employee of Congress, or an employee of a Member of Congress in connection with this Federal contract, grant, loan, or cooperative agreement, the undersigned shall complete and submit Standard FormLLL, ''Disclosure of Lobbying Activities,'' in accordance with its instructions.
(3) The undersigned shall require that the language of this certification be included in the award documents for all subawards at all tiers (including subcontracts, subgrants, and contracts under grants, loans, and cooperative agreements) and that all subrecipients shall certify and disclose accordingly. This certification is a material representation of fact upon which reliance was placed when this transaction was made or entered into. Submission of this certification is a prerequisite for making or entering into this transaction imposed by section 1352, title 31, U.S. Code. Any person who fails to file the required certification shall be subject to a civil penalty of not less than $10,000 and not more than $100,000 for each such failure.
Statement for Loan Guarantees and Loan Insurance
The undersigned states, to the best of his or her knowledge and belief, that:
If any funds have been paid or will be paid to any person for influencing or attempting to influence an officer or employee of any agency, a Member of Congress, an officer or employee of Congress, or an employee of a Member of Congress in connection with this commitment providing for the United States to insure or guarantee a loan, the undersigned shall complete and submit Standard Form-LLL, ''Disclosure of Lobbying Activities,'' in accordance with its instructions. Submission of this statement is a prerequisite for making or entering into this transaction imposed by section 1352, title 31, U.S. Code. Any person who fails to file
Project:
New Project Application FY2018
Page 14
the required statement shall be subject to a civil penalty of not less than $10,000 and not more than $100,000 for each such failure.
I hereby certify that all the information stated herein, as well as any information provided in the accompaniment herewith, is true and accurate:
Warning: HUD will prosecute false claims and statements. Conviction may result in criminal and/or civil penalties. (18 U.S.C. 1001, 1010, 1012; 31 U.S.C. 3729, 3802)
Applicant's Organization:
Name / Title of Authorized Official:
Signature of Authorized Official:
Date Signed:
Project:
1J. SF-LLL
DISCLOSURE OF LOBBYING ACTIVITIES Complete this form to disclose lobbying activities pursuant to 31 U.S.C. 1352. Approved by OMB0348-0046
HUD requires a new SF-LLL submitted with each annual CoC competition and completing this screen fulfills this requirement.
Answer "Yes" if your organization is engaged in lobbying associated with the CoC Program and answer the questions as they appear next on this screen. The requirement related to lobbying as explained in the SF-LLL instructions states: "The filing of a form is required for each payment or agreement to make payment to any lobbying entity for influencing or attempting to influence an officer or employee of any agency, a Member of Congress, an officer or employee of Congress, or an employee of a Member of Congress in connection with a covered Federal action."
Answer "No" if your organization is NOT engaged in lobbying.
New Project Application FY2018
Page 15
Does the recipient or subrecipient of this CoC grant participate in federal lobbying activities (lobbying a federal administration or congress) in connection with the CoC Program?
Legal Name:
Street 1:
Street 2:
City:
County:
State:
Country:
Zip / Postal Code:
11. Information requested through this form is authorized by title 31 U.S.C. section 1352. This disclosure of lobbying activities is a material representation of fact upon which reliance was placed by the tier above when this transaction was made or entered into. This disclosure is required pursuant to 31 U.S.C. 1352. This information will be available for public inspection. Any person who fails to file the required disclosure shall be subject to a civil penalty of not less than $10,000 and not more than $100,000 for each such failure.
I certify that this information is true and complete.
Project:
New Project Application FY2018
Page 16
Authorized Representative
Prefix:
First Name:
Middle Name:
Last Name:
Suffix:
Title:
Telephone Number:
(Format: 123-456-7890)
Fax Number:
(Format: 123-456-7890)
Email:
Signature of Authorized Representative:
Date Signed:
Project:
2A. Project Subrecipients
This form lists the subrecipient organization(s) for the project. To add a subrecipient, select the icon. To view or update subrecipient information already listed, select the view option.
Total Expected Sub-Awards:
Organization
Type
Sub- Award Amount
This list contains no items
2B. Experience of Applicant, Subrecipient(s), and Other Partners
1. Describe the experience of the applicant and potential subrecipients (if any), in effectively utilizing federal funds and performing the activities proposed in the application, given funding and time limitations.
2. Describe the experience of the applicant and potential subrecipients (if any) in leveraging other Federal, State, local, and private sector funds.
3. Describe the basic organization and management structure of the applicant and subrecipients (if any). Include evidence of internal and external coordination and an adequate financial accounting system.
4a. Are there any unresolved monitoring or audit findings for any HUD grants(including ESG) operated by the applicant or potential subrecipients (if any)?
3A. Project Detail
New Project Application FY2018
Page 19
1a. CoC Number and Name:
1b. CoC Collaborative Applicant Name:
2. Project Name:
3. Project Status:
4. Component Type: SSO
5. Does this project use one or more properties that have been conveyed through the Title V process?
6. Is this new project application requesting to transition from eligible renewal project(s) that were awarded to the same recipient and fully eliminated through reallocation in the FY 2018 CoC Program Competition? (Section II.B.2. and Section III.C.3.q. of the FY 2018 NOFA).
3B. Project Description
1. Provide a description that addresses the entire scope of the proposed project.
2. For each primary project location or structure in the project, enter the number of days from the execution of the grant agreement that each of the following milestones will occur as related to CoC Program funds requested in this project application. If a milestone is not applicable, leave the associated fields blank. If the project has only one location or structure, or no structures, complete only column A. If multiple structures, complete one column for each structure.
Note: To expend funds within statutorily required deadlines, project applicants must be able to begin assistance within 12 months of conditional award. The one exception is for applicants who are conditionally awarded sponsor-based and project-based rental assistance. These conditional award recipients will have 24 months to execute a grant agreement; however, HUD encourages all recipients conditionally awarded funds to begin assistance within 12 months. The estimated schedule should reflect these statutorily required deadlines.
| Project Milestones | Days from Execution of Grant Agreement | Days from Execution of Grant Agreement | Days from Execution of Grant Agreement |
|---|---|---|---|
| | A | B | C |
| New project staff hired, or other project expenses begin? | | | |
| Participant enrollment in project begins? | | | |
| Participants begin to occupy leased units or structure(s), and supportive services begin? | | | |
| Leased or rental assistance units or structure, and supportive services near 100% capacity? | | | |
| Closing on purchase of land, structure(s), or execution of structure lease? | | | |
| Rehabilitation started? | | | |
| Rehabilitation completed? | | | |
| New construction started? | | | |
New Project Application FY2018
Page 20
Project:
| Chronic Homeless | Domestic Violence |
|---|---|
| Veterans | Substance Abuse |
| Youth (under 25) | Mental Illness |
| Families | HIV/AIDS |
* 3. Please identify the project's specific population focus.
(Select ALL that apply)
Chronic Homeless
Domestic Violence
Veterans
Substance Abuse
Youth (under 25)
Mental Illness
Families
HIV/AIDS
Other (Click 'Save' to update)
New Project Application FY2018
Page 21
(Select ALL that apply)
4. Please select the type of SSO project:
Chronic Homeless
Domestic Violence
Veterans
Substance Abuse
Youth (under 25)
Mental Illness
Families
HIV/AIDS
Other (Click 'Save' to update)
New Project Application FY2018
Page 23
4a. Will the coordinated entry process funded in part by this grant cover the CoC’s entire geographic area?
4b. Will the coordinated entry process funded in part by this grant be easily accessible?
4c. Describe the advertisement strategy for the coordinated entry process and how it is designed to reach those with the highest barriers to accessing assistance.
4d. Does the coordinated entry process use a comprehensive, standardized assessment process?
Project:
New Project Application FY2018
Page 24
4e. Describe the referral process and how the coordinated entry process ensures that participants are directed to appropriate housing and/or services.
4f. If the coordinated entry process includes differences in the access, entry, assessment, or referral for certain populations, are those differences limited only to the following five groups: Chronically Homeless, Individuals, Families, Youth, and Persons At Risk of Homelessness?
Project:
3C. Project Expansion Information
New Project Application FY2018
Page 25
1. Will the project use an existing homeless facility or incorporate activities provided by an existing project?
6A. Funding Request
New Project Application FY2018
Page 26
1. Will it be feasible for the project to be under grant agreement by September 30, 2020?
2. What type of CoC funding is this project applying for in the 2018 CoC Competition?
3. Does this project propose to allocate funds according to an indirect cost rate?
4. Select a grant term:
* 5. Select the costs for which funding is being requested:
Supportive Services
6F. Supportive Services Budget
Instructions:
Enter the quantity and total budget request for each supportive services cost. The request entered should be equivalent to the cost of one year of the relevant supportive service.
Eligible Costs: The system populates a list of eligible supportive services for which funds can be requested. The costs listed are the only costs allowed under 24 CFR 578.53.
Quantity AND Description: This is a required field. A quantity AND description must be entered for each requested cost. Enter the quantity in detail (e.g. 1 FTE Case Manager Salary + benefits, or child care for 15 children) for each supportive service activity for which funding is being requested. Please note that simply stating "1FTE" is NOT providing "Quantity AND Detail" and limits HUD's understanding of what is being requested. Failure to enter adequate 'Quantity AND Detail' may result in conditions being placed on an award and a delay of grant funding.
Annual Assistance Requested: This is a required field. For each grant year, enter the amount of funds requested for each activity. The amount entered must only be the amount that is DIRECTLY related to providing supportive services to homeless participants.
Total Annual Assistance Requested: This field is automatically calculated based on the sum of the annual assistance requests entered for each activity.
Grant Term: This field is populated based on the grant term selected on Screen "6A. Funding Request" and will be read only.
Total Request for Grant Term: This field is automatically calculated based on the total amount requested for each eligible cost multiplied by the grant term.
All total fields will be calculated once the required field has been completed and saved.
Additional Resources can be found at the HUD Exchange:
https://www.hudexchange.info/e-snaps/guides/coc-program-competition-resources
A quantity AND description must be entered for each requested cost.
Project:
14. Substance Abuse Treatment Services
New Project Application FY2018
Page 28
15. Transportation
16. Utility Deposits
17. Operating Costs
Total Annual Assistance Requested
Grant Term
Total Request for Grant Term
Click the 'Save' button to automatically calculate totals.
Project:
6I. Sources of Match
The following list summarizes the funds that will be used as Match for the project. To add a Matching source to the list, select the icon. To view or update a Matching source already listed, select the icon.
Summary for Match
1. Will this project generate program income as described in 24 CFR 578.97 that will be used as Match for this grant?
| Match | Type | Source | Contributor | Date of |
|---|---|---|---|---|
| | | | | Commitment |
Sources of Match Detail
1. Will this commitment be used towards match ?
2. Type of commitment:
3. Type of source:
4. Name the source of the commitment: (Be as specific as possible and include the office or grant program as applicable)
5. Date of Written Commitment:
6. Value of Written Commitment:
6J. Summary Budget
The following information summarizes the funding request for the total term of the project. However, administrative costs can be entered in 8. Admin field below.
| Eligible Costs | Annual Assistance Requested (Applicant) | Grant Term (Applicant) |
|---|---|---|
| 1a. Acquisition | | |
| 1b. Rehabilitation | | |
| 1c. New Construction | | |
| 2a. Leased Units | | |
| 2b. Leased Structures | | |
| 3. Rental Assistance | | |
| 4. Supportive Services | | |
| 5. Operating | | |
| 6. HMIS | | |
| 7. Sub-total Costs Requested | | |
| 8. Admin (Up to 10%) | | |
| 9. Total Assistance | | |
| Plus Admin Requested | | |
| 10. Cash Match | | |
| 11. In-Kind Match | | |
| 12. Total Match | | |
| 13. Total Budget | | |
Click the 'Save' button to automatically calculate totals.
Project:
7A. Attachment(s)
| Document Type | Required? | Document Description |
|---|---|---|
New Project Application FY2018
Project:
Attachment Details
New Project Application FY2018
Page 33
Document Description:
Attachment Details
Document Description:
Attachment Details
Document Description:
7D. Certification
A. For all projects:
Fair Housing and Equal Opportunity
It will comply with Title VI of the Civil Rights Act of 1964 (42 U.S.C. 2000(d)) and regulations pursuant thereto (Title 24 CFR part I), which state that no person in the United States shall, on the ground of race, color or national origin, be excluded from participation in, be denied the benefits of, or be otherwise subjected to discrimination under any program or activity for which the applicant receives Federal financial assistance, and will immediately take any measures necessary to effectuate this agreement. With reference to the real property and structure(s) thereon which are provided or improved with the aid of Federal financial assistance extended to the applicant, this assurance shall obligate the applicant, or in the case of any transfer, transferee, for the period during which the real property and structure(s) are used for a purpose for which the Federal financial assistance is extended or for another purpose involving the provision of similar services or benefits.
It will comply with the Fair Housing Act (42 U.S.C. 3601-19), as amended, and with implementing regulations at 24 CFR part 100, which prohibit discrimination in housing on the basis of race, color, religion, sex, disability, familial status or national origin.
It will comply with Executive Order 11063 on Equal Opportunity in Housing and with implementing regulations at 24 CFR Part 107 which prohibit discrimination because of race, color, creed, sex or national origin in housing and related facilities provided with Federal financial assistance.
It will comply with Executive Order 11246 and all regulations pursuant thereto (41 CFR Chapter 60-1), which state that no person shall be discriminated against on the basis of race, color, religion, sex or national origin in all phases of employment during the performance of Federal contracts and shall take affirmative action to ensure equal employment opportunity. The applicant will incorporate, or cause to be incorporated, into any contract for construction work as defined in Section 130.5 of HUD regulations the equal opportunity clause required by Section 130.15(b) of the HUD regulations.
It will comply with Section 3 of the Housing and Urban Development Act of 1968, as amended (12 U.S.C. 1701(u)), and regulations pursuant thereto (24 CFR Part 135), which require that to the greatest extent feasible opportunities for training and employment be given to lower-income residents of the project and contracts for work in connection with the project be awarded in substantial part to persons residing in the area of the project.
It will comply with Section 504 of the Rehabilitation Act of 1973 (29 U.S.C. 794), as amended, and with implementing regulations at 24 CFR Part 8, which prohibit discrimination based on disability in Federally-assisted and conducted programs and activities.
It will comply with the Age Discrimination Act of 1975 (42 U.S.C. 6101-07), as amended, and implementing regulations at 24 CFR Part 146, which prohibit discrimination because of age in projects and activities receiving Federal financial assistance.
Project
It will comply with Executive Orders 11625, 12432, and 12138, which state that program participants shall take affirmative action to encourage participation by businesses owned and operated by members of minority groups and women.
If persons of any particular race, color, religion, sex, age, national origin, familial status, or disability who may qualify for assistance are unlikely to be reached, it will establish additional procedures to ensure that interested persons can obtain information concerning the assistance.
It will comply with the reasonable modification and accommodation requirements and, as appropriate, the accessibility requirements of the Fair Housing Act and section 504 of the Rehabilitation Act of 1973, as amended.
Additional for Rental Assistance Projects:
If applicant has established a preference for targeted populations of disabled persons pursuant to 24 CFR part 578 or 24 CFR 582.330(a), it will comply with this section's nondiscrimination requirements within the designated population.
B. For non-Rental Assistance Projects Only.
15-Year Operation Rule.
Applicants receiving assistance for acquisition, rehabilitation or new construction: The project will be operated for no less than 15 years from the date of initial occupancy or the date of initial service provision for the purpose specified in the application.
1-Year Operation Rule.
Applicants receiving assistance for supportive services, leasing, or operating costs but not receiving assistance for acquisition, rehabilitation, or new construction: The project will be operated for the purpose specified in the application for any year for which such assistance is provide
Where the applicant is unable to certify to any of the statements in this certification, such applicant shall provide an explanation.
Name of Authorized Certifying Official:
Date:
Title:
Applicant Organization:
PHA Number (For PHA Applicants Only):
I certify that I have been duly authorized by the applicant to submit this Applicant Certification and to ensure compliance. I am aware that any false, ficticious, or fraudulent
New Project Application FY2018
Page 35
Project
New Project Application FY2018
Page 36
08/07/2018
statements or claims may subject me to criminal, civil, or administrative penalties . (U.S. Code, Title 218, Section 1001).
8B. Submission Summary
Applicant must click the submit button once all forms have a status of Complete.
|
<urn:uuid:45467ad6-c17a-4c90-a0e3-e9dc28515049>
|
CC-MAIN-2024-10
|
https://www.thn.org/wp-content/uploads/2020/03/Blank-CE-SSO.pdf
|
2024-02-26T01:06:54+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-10/subset=warc/part-00207-d9675c6d-5c8d-45bb-9c98-c56e42022a4d.c000.gz.parquet
| 1,042,921,658
| 6,853
|
eng_Latn
|
eng_Latn
| 0.792165
|
eng_Latn
| 0.978968
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"dag_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"dag_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1977,
2284,
2842,
2946,
3225,
3668,
3949,
4761,
5342,
6663,
10274,
10776,
13573,
14187,
16005,
16291,
16614,
17408,
17976,
19862,
20514,
21013,
21500,
21700,
22131,
24092,
24383,
24862,
25167,
25998,
26127,
26307,
29480,
31641,
31828,
31934
] |
ALFRED H. TERRY
A Working Bibliography of MHI Sources
Army and Navy Journal (20 Dec 1890): p. 285. Per. His obituary
Bailey, John W. "General Terry and the Decline of the Sioux, 1866-1890." PhD dss, Marquette, 1974. 373 p. E83.866.B35.
_____. Pacifying the Plains: General Alfred Terry and the Decline of the Sioux, 1866-1890. Westport, CT: Greenwood, 1979. 236 p. E99.D1.B24.
Barrett, John G. The Civil War in North Carolina. Chapel Hill, NC: U NC, 1963. 484 p. E573.B3. See index.
Connecticut. Adjutant General's Office. Annual Report of the Adjutant General of the State of Connecticut for the Year 1861. Hartford, CT: Hawley, 1862. pp. 48 & 228-229. E499.2.C75.
Croffut, W. A., & Morris, John M. The Military and Civil History of Connecticut during the War of 1861-1865. NY: Bill, 1869. E499.C95.
Darling, Roger. A Sad and Terrible Blunder: Generals Terry and Custer at the Little Big Horn: New Discoveries. Vienna, VA: Potomac, 1990. 295 p. E83.876.D37. Examines Terry as commander & central figure.
Marino, Carl W. "General Alfred Howe Terry: Soldier from Connecticut." PhD dss, NYU, 1968. 550 p. E467.1.T38.M37.
Spiller, Roger J., editor. Dictionary of American Military Biography. Vol. 3. Westport, CT: Greenwood, 1984. pp. 1101-04. U52.D53.
Terry, Alfred H. The Field Diary of General Alfred Howe Terry: The Yellowstone Expedition-1876. Bellevue, NE: Old Army Press, 1969. 32 p. E83.876T47.
_____. Letter of 17 Jan 1865. John W. Turner Coll, Arch.
_____. Letter to Thomas M. Vincent. MOLLUS-Mass Coll, Arch.
_____. The Terry Letters: The Letters of General Alfred Howe Terry to his Sisters during the Indian War of 1876. La Miranda, CA: Willert, 1980. 59 p. E83.876.T479.
Walkley, Stephen. History of the Seventh Connecticut Volunteer Infantry. Hartford, CT: n.p., 1905. E499.5.7 th W35.
Warner, Ezra J. Generals in Blue. Baton Rouge: LSU, 1964. pp. 497-98. E467.W29.
See also:
- ca 10 photos in MOLLUS-Mass, Photo Arch.
- Official Records
|
<urn:uuid:ed1d88bb-73dd-47f3-8eac-2b44694ac2a5>
|
CC-MAIN-2024-26
|
https://www.armyheritage.org/wp-content/uploads/ref-bibs/biographies/Terry%2C%20Alfred.pdf
|
2024-06-17T04:47:47+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-26/subset=warc/part-00096-44971353-df4b-48d7-8025-975e8feb989b.c000.gz.parquet
| 584,727,212
| 695
|
eng_Latn
|
eng_Latn
| 0.665019
|
eng_Latn
| 0.604164
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1746,
2027
] |
Chapter 6
Assessment of Cumulative Effects
This chapter describes the likely effects of future nonfederal activities, including future state, tribal, local, or private actions, that are reasonably certain to occur in the project area, in combination with the Restoration Project, on federally listed, covered species. Future federal actions that are unrelated to the Restoration Project are not considered in this chapter because they require separate consultation pursuant to Section 7 of the ESA. Cumulative effects on species not federally listed (including American peregrine falcon, Cooper’s hawk, golden eagle, little willow fly catcher, osprey, yellow-breasted chat, northwestern pond turtle, and foothill yellow-legged frog) are described in the draft EIS/EIR (Jones & Stokes 2003a).
Federally listed fish and wildlife that are covered under this ASIP include winter-run Chinook salmon, spring-run Chinook salmon, steelhead, bald eagle, and valley elderberry longhorn beetle. The area for analyzing cumulative effects on covered fish and wildlife (collectively referred to as biological resources in this cumulative effects analysis) was determined to be Tehama and Shasta Counties and the surrounding Battle Creek watershed. The area within these counties and the Battle Creek watershed represent the probable area in which project effects on biological resources could interact with other development and have significant cumulative effects on sensitive biological resources.
Table 6-1 describes nonfederal-related projects in Tehama and Shasta Counties and the Battle Creek watershed that may have significant cumulative effects on sensitive biological resources in combination with implementation of the Restoration Project. The following sections describe cumulative effects on covered fish and wildlife species.
Fish
Cumulative effects on fish and aquatic species associated with the Restoration Project and past, present, or reasonably foreseeable future projects would not occur in the Battle Creek watershed because no other nonfederal projects (including related projects listed in Table 6-1, with exception of the incomplete Lassen Lodge project) would contribute to the cumulative decline of fish species or the degradation of fish habitat in Battle Creek.
Table 6-1. Projects Related to the Battle Creek Salmon and Steelhead Restoration Project that are being Completed in Partnership with Non-Federal Agencies, Including Non-Federal Money
| Project, Plan, or Action | Implementing Party | Summary of Activities |
|--------------------------|--------------------|-----------------------|
| **Projects That Could Directly Affect or Be Affected by the Restoration Project** |
| Battle Creek Watershed “Community” Plan | Battle Creek Watershed Conservancy | The Battle Creek Watershed Conservancy was formed in 1997 and was charged with developing a guiding “community” plan that was intended to supplement existing technical plans in the Battle Creek watershed. The plan:
- identified important factors affecting fish habitat,
- recommended projects to address these factors, and
- described a monitoring program to evaluate current conditions and project results.
The funding also supported:
- monthly conservancy meetings,
- educational tours of restoration sites,
- development of articles for publication in local newspapers,
- television coverage of restoration plans and activities,
- development of public outreach materials and a watershed-wide database listing relevant contact information, and
- the assembly of a library of published material about the watershed. |
| Battle Creek Watershed Community Strategy | Battle Creek Watershed Conservancy | The Community Strategy (Paquin-Gilmore 1999) is a long-term plan developed as a response to the Restoration Project. The strategy is the result of extensive public input from many community meetings and emphasizes the restoration of chinook salmon to Battle Creek and the continuation of a healthy, fully functioning watershed in the context of community issues and concerns. |
| Battle Creek Watershed Assessment Report | Battle Creek Watershed Conservancy | The Watershed Assessment Report is expected to be completed in 2003. It describes the ecological state of the Battle Creek watershed and the historical role it has played in the development of hydroelectric power and fish culture. Because the report contemplates a substantial reallocation of streamflow away from hydroelectric production, including the complete removal of some dams and their appurtenant facilities, it carefully spells out the steps taken to assign species priorities to each stream. It also sets out those physical actions and the monitoring and evaluation needed to achieve and sustain the restoration of salmon and steelhead in Battle Creek. |
| Project, Plan, or Action | Implementing Party | Summary of Activities |
|--------------------------|--------------------|-----------------------|
| Continued Stewardship of Battle Creek | Battle Creek Watershed Conservancy | The Conservancy has also received funding for implementing tasks essential to the stewardship of the Battle Creek watershed. These tasks are directed to long-term protection of the public investment in the watershed including:
- implementation of a watershed strategy,
- development of a workgroup to address upper watershed processes,
- implementation of fuels management and fire defense improvements,
- planning and implementation of conservation easements, and
- control of noxious weeds. |
| Lassen Lodge Hydropower Project | Rugraw, Inc. | The Lassen Lodge Hydropower Project is a proposed 7,000-kilowatt hydroelectric generating station to be constructed on the western slopes of the Cascade Range near the town of Mineral, an unincorporated community in Tehama County, California. The proposed project is located upstream of South Diversion Dam and above Panther Creek. Anadromous fish migrate as far upstream as Angel Falls, a natural fish passage barrier above Panther Creek on South Fork Battle Creek (Synergics Energy Services, LLC 2002; DFG 2002). |
| Gravel Removal Agreements | PG&E and DFG | Currently, PG&E, and DFG are working to finalize gravel management agreements that will be included in the final version of the FERC license amendment for the Hydroelectric Project. The gravel management agreements have permitted PG&E to dispose of gravel and sand that has accumulated behind South, Inskip, and Coleman Diversion Dams by placing the materials downstream of the dams. No gravel is to be removed from the floodway of the stream. The intent of these agreements is to mimic natural downstream sediment movement and to enhance the spawning gravel for salmon and steelhead. |
| Mount Lassen Trout Farms, Inc. | Mount Lassen Trout Farms, Inc. | Mount Lassen Trout Farms, Inc., consists of nine private trout-rearing facilities located within the watershed. This operation rears rainbow and brown trout for stocking in private ponds and lakes throughout California. Although the facilities are located above the anadromous habitats of Battle Creek, some facilities are located near Hydroelectric Project canals. Concern has been expressed about possible disease transmission between the canals and these facilities. |
| Darrah Springs Hatchery | DFG | Darrah Springs is located on Baldwin Creek, a tributary to mainstem Battle Creek. It is a key hatchery of DFG’s inland fisheries program and raises catchable trout for sport fisheries. |
Upon implementation of the Restoration Project, steelhead and winter- and spring-run Chinook salmon, species listed under the ESA, are expected to increase substantially in abundance. The increased population abundance of steelhead and winter- and spring-run Chinook salmon associated with the Restoration Project is likely to increase the resistance and resilience of the populations in Battle Creek.
Additional future projects that would be beneficial to anadromous fish include DWR’s proposition to place spawning-sized gravel in the lower reaches of Battle Creek to double or triple the area available for salmon spawning. DFG has also proposed enhancing existing spawning gravel supplies on a ¼-mile stretch of Baldwin Creek and improving a partial natural barrier on Baldwin Creek.
In summary, the Restoration Project and past, present, or probable future projects, including those proposed by DWR for Battle Creek and by DFG for Baldwin Creek, would substantially benefit fish populations in the Battle Creek watershed. No additional conservation measures are required beyond those proposed for each potential effect described in Chapter 4 of this ASIP.
**Wildlife**
Cumulative effects on federally listed wildlife species associated with the Restoration Project and past, present, or reasonably foreseeable future projects would not occur in the Battle Creek watershed because no other projects (including related projects listed in Table 6-1) would contribute to significant cumulative effects on covered wildlife species or their habitats in the Battle Creek watershed, including bald eagle, golden eagle, and valley elderberry longhorn beetle. Other proposed and ongoing projects in the Battle Creek watershed, including the Lassen Lodge Hydropower Project, may have some effect on these species; however, these effects would not result in a significant cumulative decline of covered wildlife species.
This cumulative effects analysis on these resources considered the following factors to determine whether the Restoration Project would result in significant cumulative effects on biological resources:
- historical and currently known distribution of special-status wildlife species within Tehama and Shasta Counties and statewide;
- extent of sensitive biological resources protected on public lands and current known threats to these resources on private lands (e.g., proposed development, current agricultural practices, and land management practices); and
- documented effects associated with approved or pending future projects within Tehama and Shasta Counties and the Battle Creek watershed.
Based on these evaluation criteria, the Restoration Project, in combination with past, present, or reasonably foreseeable future projects, would not have a cumulatively adverse effect on covered wildlife species that are known to occur in the Battle Creek watershed. No additional conservation measures are required beyond those proposed for each potential effect described in Chapter 4 of this ASIP.
|
<urn:uuid:b82951cc-7da1-4681-a473-87d17eab8340>
|
CC-MAIN-2015-11
|
https://nrm.dfg.ca.gov/FileHandler.ashx?DocumentID=5421
|
2015-03-02T01:02:38Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462577.56/warc/CC-MAIN-20150226074102-00038-ip-10-28-5-156.ec2.internal.warc.gz
| 872,464,506
| 1,956
|
eng_Latn
|
eng_Latn
| 0.990076
|
eng_Latn
| 0.989806
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
2282,
4832,
7536,
10155,
10557
] |
§5141.1. Protection from Wildfire Smoke.
(a) Scope.
(1) This section applies to workplaces where the Air Quality Index (AQI) for PM2.5 is greater than 150, regardless of the AQI for other pollutants, and
(A) A wildfire smoke advisory has been issued by a local, regional, state, or federal government agency; or
(B) There is a realistic possibility that employees may be exposed to wildfire smoke.
Note 1: The AQI and AQI forecasts are available from the U.S. Environmental Protection Agency AirNow website, California Air Resources Board, air pollution control districts, and air quality management districts.
Note 2: Information on areas where smoke from wildland fires may be of concern and wildfire smoke forecasts are provided by the Wildland Fire Air Quality Response Program (WFAQRP) of the U.S. Forest Service.
```
For the advisory meeting, some additional sources for wildfire smoke and air quality are: http://californiasmokeinfo.blogspot.com https://inciweb.nwcg.gov/ https://www.airnow.gov/index.cfm?action=topics.smoke_wildfires https://fires.airfire.org/outlooks https://sites.google.com/firenet.gov/wfaqrp-external/home
```
(2) The following workplaces and operations are exempt from this section:
(A) Enclosed buildings or structures where the air is filtered by a mechanical ventilation system and employee exposure to outdoor or unfiltered air is effectively limited.
(B) Enclosed vehicles where the air is filtered by a cabin air filter and employee exposure to outdoor or unfiltered air is effectively limited.
(C) The employer demonstrates that the concentration of PM2.5 in the air does not exceed a concentration that corresponds to an AQI of 150.
(D) Firefighters engaged in wildland firefighting.
(E) Emergency response personnel performing lifesaving emergency rescue and evacuation.
(3) For workplaces covered by this section, an employer that is in compliance with this section will be considered compliant with sections 5141 and 5155 for PM2.5 with an AQI over 150.
(b) Definitions.
Air Quality Index (AQI). The official index for reporting air quality based on the National Ambient Air Quality Standards set by the U.S. Environmental Protection Agency under the federal Clean Air Act. AQI requirements are specified in the Code of Federal Regulations (CFR) at 40 CFR section 58.50, Index Reporting, and 40 CFR Appendix G to Part 58, Uniform Air Quality Index (AQI) and Daily Reporting. The AQI index is divided into six categories as shown in the table below (adapted from Table 2 of 40 CFR Appendix G to Part 58).
AQI Categories for PM2.5
| Air Quality Index (AQI) Categories for PM2.5 | PM2.5 in micrograms per cubic meter (μg/m3) |
|---|---|
| 0 to 50 | 0 to 12.0 |
| 51 to 100 | 12.1 to 35.4 |
| 101 to 150 | 35.5 to 55.4 |
| 151 to 200 | 55.5 to 150.4 |
| 201 to 300 | 150.5 to 250.4 |
| 301 to 500 | 250.5 to 500.4 |
Effective filtration of PM2.5. An area within enclosed buildings, structures, or vehicles that meets either of the following:
(1) The air is filtered by mechanical ventilation system(s) with MERV 13 or equivalent filters, or by more effective filters such as HEPA filters; or
(2) The concentration of PM2.5 corresponds to an AQI of 150 or less.
High-efficiency particulate air (HEPA) filter. A filter that is at least 99.97 percent efficient in removing particles 0.3 micrometers in diameter.
MERV. Minimum Efficiency Reporting Value for air filters established by the American Society of Heating, Refrigerating and Air-Conditioning Engineers Standard 52.2-2017 Method of Testing General Ventilation Air-Cleaning Devices for Removal Efficiency by Particle Size.
NIOSH. The National Institute for Occupational Safety and Health of the U.S. Centers for Disease Control and Prevention. NIOSH tests and approves respirators for use in the workplace.
PM2.5. Particulate matter (solid particles and liquid droplets) suspended in air with an aerodynamic diameter of less than 2.5 micrometers.
Wildfire Smoke. Emissions from planned or unplanned fires in "wildlands" (as defined in section 3402), wildland-urban interfaces, or adjacent developed areas.
(c) Identification of harmful exposures. Whenever an employee may reasonably be expected to be exposed to an AQI greater than 150, the employer shall check AQI forecasts and the current AQI on the AirNow website. The employer shall determine the AQI where employees are located, before each shift, and periodically thereafter as needed. The employer may also obtain AQI forecasts and the current AQI from the California Air Resources Board, the local air pollution control district, or the local air quality management district.
(d) Communication. The employer shall establish and implement a system for communicating wildfire smoke hazards, as required by section 3203, in a form readily understandable by all affected employees without fear of reprisal. The system shall include effective procedures for:
(1) Informing employees of:
(A) The current PM2.5 levels;
(B) Changes in conditions that may lead to a worsening of air quality, such as changing wind patterns or temperature inversions; and
(C) Protective measures available to employees to reduce their wildfire smoke exposures.
(2) Encouraging employees to inform the employer of:
(A) Worsening of air quality;
(B) Changes in conditions that may lead to a worsening of air quality, such as changing wind patterns; and
(C) Any adverse symptoms likely resulting from wildfire smoke exposure such as asthma attacks, difficulty breathing, and chest pain.
(e) Training. The employer shall provide employees with effective training on all of the following:
(1) Health effects of wildfire smoke.
(2) The employer's communication system required by subsection (d).
(3) The right to obtain medical treatment in the event of injury or illness without fear of reprisal.
(4) How employees can check the AQI at their location.
(5) Requirements of this section.
(6) Employer's methods to protect employees from wildfire smoke.
(7) Importance, limitations, and benefits of using a respirator when exposed to wildfire smoke.
(8) How to properly put on, use, and maintain the respirators provided by the employer.
(9) What actions to take if an emergency evacuation of the work area becomes necessary.
NOTE: See Appendix A of this section for information required to be included in employee training. 1
(f) Control of harmful exposures to employees.
(1) Engineering Controls. Employee exposures to PM2.5 corresponding to an AQI exceeding 150 shall be prevented by engineering controls whenever feasible, such as providing enclosed structures or vehicles with effective filtration of PM2.5 for employees to work in.
EXCEPTION to subsection (f)(1). The employer is not required to implement engineering controls for employees who are exposed to PM2.5 corresponding to an AQI exceeding 150 for less than one hour during a shift.
(2) Administrative Controls. Whenever engineering controls are not feasible or do not reduce employee exposures to PM2.5 corresponding to an AQI of 150 or less, administrative controls shall be implemented, if practicable, such as relocating work to a location where the AQI is lower, changing work schedules, reducing work intensity, or providing additional rest periods.
(3) Control by Respiratory Protective Equipment. Where feasible engineering controls and administrative controls fail to eliminate employee exposure to PM2.5 corresponding to an AQI of 150 or less, employers shall comply with the following:
(A) Where the AQI exceeds 150 and is less than 301, the employer shall provide respirators to all employees for voluntary use in accordance with section 5144 and encourage employees to use respirators. Respirators shall be NIOSH-approved devices that effectively protect the wearers from inhalation of PM2.5 (such as N95 filtering facepiece respirators). Respirators shall be
1 Appendix A is a placeholder. The content of required training will be spelled out in the appendix after discussions with stakeholders.
cleaned, stored, and maintained so that they do not present a health hazard to users. Employers shall use Appendix A to this section in lieu of Appendix D to section 5144 for training regarding voluntary use of respirators.
NOTE 1 for subsection (f)(3)(A). Respirator use is not required when the AQI is less than 301.
NOTE 2 for subsection (f)(3)(A). For voluntary use of filtering facepieces, such as N95 respirators, section 5144 does not require fit testing or medical evaluations. For voluntary use of respirators that are not filtering facepieces, such as those with an elastomeric facepiece, section 5144 does not require fit testing, but does require medical evaluations.
(B) Where the AQI is 301 or greater, respirators shall be used in accordance with section 5144. The assigned protection factor of respirators shall ensure that the concentration of PM2.5 inside the respirator corresponds to an AQI of 150 or less.
|
<urn:uuid:d284e4cb-8f99-441f-9ec3-4a99b096a8ef>
|
CC-MAIN-2022-33
|
https://www.dir.ca.gov/dosh/doshreg/Protection-from-Wildfire-Smoke/Comments-1/Susan-Aitkens.pdf
|
2022-08-07T18:51:53+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-33/subset=warc/part-00051-d466b69e-be2b-4525-ac34-1b10d57329da.c000.gz.parquet
| 683,515,494
| 1,989
|
eng_Latn
|
eng_Latn
| 0.983339
|
eng_Latn
| 0.986768
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2551,
5108,
8009,
8940
] |
5
th
December 2014
Dear parents/carers,
Art and Design
Years 1, 2 and 3 pupils have had a whole day Art and Design project today. The stimuli for the 2D media unit was 'The Chamber Orchestra' by Raoul Dufy and 'Street in Saintes Maries' by Vincent
Van Gogh. The pupils used pencils to 'take a line for a walk'. We are looking forward to seeing the outcomes of the day, which will be framed or made into books.
Christmas lunch
Our Christmas lunch will take place on Wednesday 10
of food, including a vegetarian option.
Parent/carer consultations
Consultations with each class teacher are happening next week and we are looking forward to sharing with you the progress your child/ren has/have made since 9
th
September.
PE
Years 1, 2 and 3 will have PE at School during the Spring term. The unit will be Dance. All pupils need to bring to School a dark - navy or black - T-shirt and dark shorts, dark leggings or dark
tracksuit bottoms on their PE day.
Photography project
The Year 3 pupils have been excitedly learning how to use a camera to take images around the
Local Environment. This week they used a laptop computer to enhance their images with a variety of techniques. The initial results are very impressive!
Professional development
Most of our staff have attended a whole day of Read, Write Inc. training today, held in School. This will ensure that they are delivering daily lessons very effectively.
Executive Principal: Amanda Phillips
11 Solebay Street, London E1 4PW
t:
e:
www.solebayacademy.org th
December and there will be many choices
Paradigm Trust
Registered office: Dee Street, London E14 0PT
Registered in England and Wales
Number 8469218
Reception
The Reception classes visited the Discover Centre in Stratford this week. They were very excited that 'Hootah' had written them a letter inviting them to come and make stories. They have had x1 further puppet making session with parents/carers, making a character from their story, and a further story session from Alicia Whytock from Culloden Primary Academy.
Year 1 Blue
Louise Hillary has an extended leave period (booked before she committed to teaching at Paradigm Trust). She will be returning to School on Monday 5 th January 2015. Tahreena Ward, our experienced, senior teacher in Year 1 will be teaching for the duration, so there will be no loss of learning.
Yours faithfully,
Amanda Phillips Executive Principal
t:
e:
www.solebayacademy.org
|
<urn:uuid:e3c06b03-0f3f-4455-9c32-67a9c43a45aa>
|
CC-MAIN-2022-49
|
https://solebayacademy.paradigmtrust.org/wp-content/uploads/2015/01/SPA-AP-letter-to-families-051214.pdf
|
2022-12-08T22:44:41+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-49/subset=warc/part-00296-a0906200-461b-4808-9b94-6c53daf73f61.c000.gz.parquet
| 568,981,814
| 563
|
eng_Latn
|
eng_Latn
| 0.998105
|
eng_Latn
| 0.998404
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1692,
2463
] |
Product Note
Workflow Solutions
An Express Workflow to Generate SMRTbell ® Libraries for Genomic DNA in as little as 4 Hours
The SMRTbell Express Template Prep Kit 2.0 provides a streamlined, single-tube reaction strategy to generate SMRTbell libraries from 500 bp to >50 kb insert size targets to support large-insert genomic libraries, multiplexed microbial genomes and amplicon sequencing. With this new formulation, we have increased both the yield and efficiency of SMRTbell library preparation for SMRT Sequencing while further minimizing handling-induced DNA damage to retain the integrity of genomic DNA (gDNA).
This product note highlights the key benefits, performance, and resources available for supporting de novo genome sequencing and structural variant detection projects. Our large-insert gDNA protocol has been streamlined to support SMRTbell library generation in only 4 hours, making complete construction in less than a day. This significantly reduces time to results for generating high-quality genome assemblies to fully characterize SNPs and structural variants. Additional key benefits of this template preparation kit and updated protocol include library generation with as little as 2 to 3 µg input gDNA and flexibility to accommodate and adjust input amount in accordance with the extracted gDNA quality.
Workflow
Supported Applications Discussed in this Product Note are:
* De novo genome assemblies
* Low-fold coverage structural variant detection
Key Benefits:
* Reduced gDNA input requirement
* Fast library template preparation
* Minimal handling-induced gDNA damage
Protocol
* Procedure & Checklist - Preparing gDNA Libraries Using the SMRTbell® Express Template Preparation Kit 2.0
Library Generation Time
* Approx. 4 hours (excluding QC and size-selection)
Figure 1. SMRTbell Express Template Prep Kit 2.0 workflow for generating large-insert libraries in ~ 4 hours. Does not include QC and size-selection time.
Libraries Supported
* # Rxns:
18 large-insert gDNA libraries
* Insert Sizes:
10 kb to >50 kb www.pacb.com
pacb.com
Expected Performance*
| Library Type SMRTbell insert library size supported | SMRTbell Library Yield Yield of SMRTbell libraries for sheared gDNA input | Sequencing Yield Mapped bases per input ug of sheared gDNA |
|---|---|---|
| 15 kb Size-selected Libraries | up to 27% | up to 250 Gb |
| 30 kb Size-selected Libraries | up to 20% | up to 35 Gb |
| 10 kb Non-size-selected Libraries | up to 75% | up to 450 Gb |
Estimated sequencing yield for respective library types.
Table 1.
Generating Large-insert Libraries:
Example gel images for >30 kb and >15 kb size-selected libraries
Example QC gel for a
Express library 2.0 show fragment
>30 kb size-selected SMRTbell smear extending up to 97 kb.
Sequencing Performance*
| Library Type with Sequencing 3.0 | Polymerase Read Length (Average) | Polymerase Read Length (N50) | Longest Subread (Average) |
|---|---|---|---|
| >30 kb size-selected libraries | up to 30 kb | up to 45 kb | up to 35 kb |
| 10 kb libraries with no size selection | up to 24 kb | up to 50 kb | up to 6.5 kb |
Table 2. Estimated sequencing read length performance for given library
Input Requirements
Recommended shearing methods and input gDNA qualities for supported library types:
| Insert Size Target | Size Selection | gDNA Quality Required | Shearing Method | Range of Sheared and Concentrated Input gDNA (µg) | Recommended Sheared and Concentrated DNA Amount |
|---|---|---|---|---|---|
| ~10 kb | No | Mode >20 kb | g-TUBE | 1.0 to 2.0 µg | 1.0 µg |
| >15 kb (size-selected using BluePippin system) | Yes | Mode >40 kb | g-TUBE or Megaruptor® | 2.0 to 5.0 µg | 3.0 µg |
Resources
1. Applications Website: Whole Genome Sequencing Application
2. Application Brief: Plant and Animal Whole Genome Sequencing Best Practices
3. Application Brief: Low-coverage, Long-read Whole Genome Sequencing for Structural Variation
4. Infographic: Gold-Standard Reference Genomes Accelerate Science
*Sequencing performance, reads/data per SMRT Cell and other expected results vary based on sample quality/type and insert size.
Product Note
Workflow Solutions
|
<urn:uuid:ed94d331-e73f-4797-b02e-194be1e9d5ca>
|
CC-MAIN-2023-23
|
https://www.pacb.com/wp-content/uploads/Product-Note-Express-2.0-Large-Insert-Libraries.pdf
|
2023-06-07T06:31:24+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-23/subset=warc/part-00267-ffa3bf93-6ba1-4a27-adea-b0baae3b4389.c000.gz.parquet
| 1,015,576,299
| 998
|
eng_Latn
|
eng_Latn
| 0.921911
|
eng_Latn
| 0.960325
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2085,
4177
] |
Topical Corticosteroids
This sheet is about exposure to topical corticosteroids during pregnancy and while breastfeeding. This information should not take the place of medical care and advice from your healthcare provider.
What are topical corticosteroids?
Topical corticosteroids are medications that are put directly on the skin and have been used to treat skin conditions like eczema, psoriasis, and other rashes. They may be in the form of a lotion, cream, ointment, or gel. There are many different corticosteroids with different names. Topical corticosteroids include over the counter products such as hydrocortisone and stronger prescription medications such as clobetasol, betamethasone, or triamcinolone.
Sometimes when people find out they are pregnant, they think about changing how they take their medication, or stopping their medication altogether. However, it is important to talk with your healthcare providers before making any changes to how you take your medication. Your healthcare providers can talk with you about the benefits of treating your condition and the risks of untreated illness during pregnancy.
Topical corticosteroids are often a first line treatment during pregnancy for different skin conditions. This is because the amount of medication that can reach the developing pregnancy by absorption through the skin is much lower than with medications taken by mouth. For questions about a specific topical corticosteroid, talk with your healthcare provider or a MotherToBaby specialist
Does the amount that you put on your skin matter?
When used over large areas of skin, more medication can be absorbed into a person's blood stream than when used on smaller areas of skin. Also, skin on certain parts of the body can absorb medication more easily than other areas. For example, more medication is absorbed through the face than from the soles of the hands and feet.
Does the strength of the topical medication matter?
Medication can vary in how strong the active ingredient is and in how much of the medication is in the product. The stronger the topical corticosteroid, the more likely a higher amount will be absorbed into the blood stream. Usually, it is suggested to use the lowest effective strength needed to treat your condition.
Are there other factors that affect how much medication is absorbed?
Less medication is likely to be absorbed through healthy, unbroken skin. More medication is thought to be absorbed through broken skin or if applied under a bandage or dressing. The more times the medication is applied on the skin, the more it can be absorbed.
I use topical corticosteroids. Can it make it harder for me to get pregnant?
It is not known if using topical corticosteroids can make it harder to get pregnant. Contact a MotherToBaby specialist to get the most current information available for the specific topical corticosteroid you are using.
Does using topical corticosteroids increase the chance for miscarriage?
Miscarriage is common and can occur in any pregnancy for many different reasons. Based on the studies reviewed, the use of topical corticosteroids is not expected to increase the chance for miscarriage.
Does using topical corticosteroids increase the chance of birth defects?
Every pregnancy starts out with a 3-5% chance of having a birth defect. This is called the background risk. Studies looking at topical corticosteroid exposure have not found an increased chance for birth defects. In many cases, only a small amount of the corticosteroid is expected to be absorbed with topical exposure, with little medication getting into the blood stream.
There has been some conflicting information about the use of oral corticosteroids (taken as pills) during the first trimester. Older studies suggested a possible increased chance for having a baby with a cleft lip (an opening in the upper lip) with or without a cleft palate (opening in the roof of the mouth). Newer studies and further review of the
older studies do not support this. Also, taking a corticosteroid by mouth would result in a much greater amount of the medication in your blood stream, compared to topical use.
Does using topical corticosteroids in pregnancy increase the chance of other pregnancy-related problems?
Not all topical corticosteroids have been well studied in pregnancy. When used as directed, topical corticosteroids would be unlikely to greatly increase the chance for pregnancy complications. The use of very strong corticosteroids over large areas of the body for a long time might be associated with lower birth weight.
Does using topical corticosteroids in pregnancy affect future behavior or learning for the child?
Based on the studies reviewed, it is not known if using topical corticosteroids increases the chance for behavior or learning issues.
Breastfeeding while using topical corticosteroids:
Not all topical corticosteroids have been well studied for use in breastfeeding. In most cases, high absorption into the blood stream and passing into milk in large amounts would only be expected with very strong corticosteroids used on large areas of the body. Medications placed on the breast or nipple area should be wiped off before breastfeeding or coming into contact with your baby's skin and mouth. Wash your hands well after applying the medication. Be sure to talk to your healthcare provider about all of your breastfeeding questions.
If a male uses topical corticosteroids, could it affect fertility (ability to get partner pregnant) or increase the chance of birth defects?
Based on the studies reviewed, it is not known if topical corticosteroids could affect male fertility or increase the chance of birth defects above the background risk. In general, exposures that fathers or sperm donors have are unlikely to increase risks to a pregnancy. For more information, please see the MotherToBaby fact sheet Paternal Exposures at https://mothertobaby.org/fact-sheets/paternal-exposures-pregnancy/.
There is a registry for betamethasone in the treatment of autoimmune diseases. You can call 877-311-8972. For information online: https://mothertobaby.org/pregnancy-studies/.
Please click here for references.
Questions? Call 866.626.6847 | Text 855.999.3525 | Email or Chat at MotherToBaby.org.
Disclaimer: MotherToBaby Fact Sheets are meant for general information purposes and should not replace the advice of your health care provider. MotherToBaby is a service of the non-profit Organization of Teratology Information Specialists (OTIS). OTIS/MotherToBaby encourages inclusive and person-centered language. While our name still contains a reference to mothers, we are updating our resources with more inclusive terms. Use of the term mother or maternal refers to a person who is pregnant. Use of the term father or paternal refers to a person who contributes sperm. Copyright by OTIS, April 1, 2022.
|
<urn:uuid:edb65961-1554-472b-9245-2da3a9b5b9a2>
|
CC-MAIN-2024-10
|
https://mothertobaby.org/fact-sheets/topical-corticosteroids-pregnancy/pdf/
|
2024-02-28T15:12:40+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-10/subset=warc/part-00060-d9675c6d-5c8d-45bb-9c98-c56e42022a4d.c000.gz.parquet
| 407,416,414
| 1,456
|
eng_Latn
|
eng_Latn
| 0.997521
|
eng_Latn
| 0.997865
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3973,
6883
] |
BENEDICT SPENCE
Cinematographer
DRAMA:
Great Expectations
In My Skin
Gameface
(Block 1)
TV 4x 25'
Dir. Lucy Forbes
Prod. Mark Kinsella
FX/BBC
This Is Going To Hurt
(Block 1)
TV 4x 25'
Dir. Lucy Forbes
Prod. Holly Pullinger
BBC/AMC
The End Of The Fucking World 2
(Block 1) TV 4x 25'
Dir. Lucy Forbes
Prod. Jenny Frayn
Winner 2020 BAFTA, Best Drama
Emmy Nominated 2020, Outstanding Cinematography in a 30 minute
TV 5x 25'
Dir. Lucy Forbes
Prod. Sophie Francis
BBC/Hulu
Pilot, Winner 2019 BAFTA Wales, Best Drama
Series, Nominated 2020 BAFTA Wales, Best Drama
The Blue Door
Short Film
Dir. Paul Taylor
Prod. Megan Pugh
Short
Nominated, 2019 BAFTA, Best British Short
TV 6x 25'
Dir. Andrew Chaplin
Prod. Charlotte Lewis
Witless Series 1, 2, 3
TV 15x 25' Dir. Andrew Chaplin
Prod. Charlotte Lewis
BBC1
Charlie Brooker's Wipe
TV Factual Dir. Lorry Powles
Prod. Charlie Brooker
Channel 4
Winner, 2017 BAFTA, Best Comedy/Comedy entertainment
David Guetta: Nothing But The Beat
Feature Doc Dir. Huse Monfaradi
Prod. Sasha Nixon
Partizan
T: +44 781 4021050
E: [email protected]
W: www.benedictspence.com
Netflix/Channel 4
Channel 4/Hulu
COMMERCIAL:
PROMO/FASHION:
|
<urn:uuid:c0a69d9f-761b-41d9-a808-df3d560ccc82>
|
CC-MAIN-2022-33
|
https://fabrikmedia.blob.core.windows.net/xe5/files/benedictspencecv2022-0.pdf
|
2022-08-20T05:59:38+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-33/subset=warc/part-00106-d466b69e-be2b-4525-ac34-1b10d57329da.c000.gz.parquet
| 245,942,179
| 405
|
eng_Latn
|
eng_Latn
| 0.580131
|
eng_Latn
| 0.580131
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
1214
] |
ANNEX E: PARTNERSHIP STATEMENT
The partnership statement must be signed by an authorized person.
A partnership is a relationship of substance between two or more organisations involving shared responsibilities in undertaking the action funded in the framework of Kolarctic CBC Programme 20142020 (Managing Authority, Regional Council of Lapland). To ensure that the action runs smoothly, the Managing Authority requires all partners to acknowledge this by agreeing to the principles of good partnership practice set out below.
1. All partners must have read the application form and understood what their role in the action will be before the application is submitted to the Managing Authority.
2. All partners must have read the standard Grant Contract and understood what their respective obligations under the contract will be if the grant is awarded. They authorise the Lead Partner to sign the contract with the Managing Authority and represent them in all dealings with the Managing Authority in the context of the action's implementation.
3. The applicant must consult with its partners regularly and keep them fully informed of the progress of the action.
4. All partners have a right to receive copies of the reports - narrative and financial - made to the Managing Authority.
5. Partners are responsible to provide the Lead Partner with needed documents related to the clarifications and reports to the Managing Authority in time.
6. Proposals for substantial changes to the action (e.g. activities, partners, etc.) should be agreed by the partners before being submitted to the Managing Authority. Where no such agreement can be reached, the applicant must indicate this when submitting changes for approval to the Managing Authority.
7. Where the Lead Partner or Partner does not have its headquarters in the country where the action is implemented, the partners must agree before the end of the action, on an equitable distribution of equipment, vehicles and supplies for the action purchased with the EU grant among local partners or the final beneficiaries of the action.
8. Partner is committed to finance the project (own contribution)
with the amount of €___________________ , which is equal to the ___________ % of the net eligible costs of the partner.
Final amount of the own contribution is calculated from the total approved costs using the above mentioned percentage.
I have read and approved the contents of the proposal submitted to the Managing Authority. I undertake to comply with the principles of good partnership practice.
Date and place:
Organisation:
Name:
Position:
Signature:
|
<urn:uuid:bcfaef87-4763-4c16-80dc-b58b5ed87691>
|
CC-MAIN-2024-42
|
https://kolarctic.info/wp-content/uploads/2016/10/annex-e-partnership-statement.pdf
|
2024-10-08T17:47:42+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-42/subset=warc/part-00266-0c083cf2-c0ed-42ad-af5c-44f7548e96a0.c000.gz.parquet
| 306,375,881
| 477
|
eng_Latn
|
eng_Latn
| 0.996968
|
eng_Latn
| 0.996968
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
2622
] |
Haddonfield Board of Education
Policy 1110 Organizational Chart
Community
BOE
Superintendent of Schools
Director of Technology
Technology Staff
Director of Special Education
CST, Related Services, Special Programs
Supervisor Buildings/Grounds
Director of Maintenance
Transportation
Food Services
Business Administrator
Business Office Staff
Communications Specialist
Administrative Assistant
Educational Assistants
Clerical Staff
Coaches
Assistant Superintendent
Safety Coordinator/Testing Supervisor
LPDC/Curriculum
Athletic Director
Assistant Principals
Teachers, Guidance, Librarians & Nurses
Principals
Created Using Lucid.app
BOE Revised Date: 12/2022
|
<urn:uuid:45461772-fa68-4939-af7a-980479face2f>
|
CC-MAIN-2023-14
|
https://boe.haddonfieldschools.org/wp-content/uploads/2022/12/1110-Organizational-Chart-December-2022-Update.pdf
|
2023-03-22T06:46:14+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-14/subset=warc/part-00071-39c03058-7d78-443d-9984-102329513e3d.c000.gz.parquet
| 174,508,857
| 145
|
eng_Latn
|
eng_Latn
| 0.446006
|
eng_Latn
| 0.446006
|
[
"eng_Latn"
] | false
|
docling
|
[
684
] |
WorldCourtsTM
Institution:
Inter-American Commission on Human Rights
File Number(s):
Report No. 28/98; Case 11.625
Session:
Ninty-Eighth Regular Session (17 February – 6 March 1998)
Title/Style of Cause:
Maria Eugenia Morales de Sierra v. Guatemala
Doc. Type:
Decision
Decided by:
Chairman: Carlos Ayala Corao;
First Vice Chairman: Robert K. Goldman;
Second Vice Chairman: Jean Joseph Exume.
Dated:
6 March 1998
Citation:
Morales de Sierra v. Guatemala, Case 11.625, Inter-Am. C.H.R., Report No.
28/98, OEA/Ser.L/V/II.102, doc. 6 rev. (1998)
Terms of Use:
Your use of this document constitutes your consent to the Terms and Conditions found at www.worldcourts.com/index/eng/terms.htm
I. CLAIMS PRESENTED
1. On February 22, 1995, the Inter-American Commission on Human Rights (hereinafter "Commission") received a petition dated February 8, 1995 alleging that various provisions of the Civil Code of the Republic of Guatemala (hereinafter "Civil Code," and "State," "Guatemala" or "Guatemalan State," respectively) which establish the legal regime defining the role of each spouse within a marriage create distinctions between men and women which are discriminatory and violative of Articles 1.1, 2, 17 and 24 of the American Convention on Human Rights (hereinafter "American Convention").
2. The petitioners indicated that Article 109 of the Civil Code confers the power to represent the marital union upon the husband, while Article 115 sets forth the exceptional instances when this authority may be exercised by the wife. Article 131 empowers the husband to administer marital property, while Article 133 provides for limited exceptions to that rule. Article 110 addresses responsibilities within the marriage, conferring upon the wife the "special right and obligation" to care for minor children and the home. Article 113 provides that a married woman may only exercise a profession or maintain employment where this does not prejudice her role as mother and homemaker. They stated that, according to Article 114, a husband may oppose his wife's activities outside the home, as long as he provides for her and has justified reasons. Article 255 confers primary responsibility on the husband to represent the children of the union and to administer their property. Article 317 provides that, by virtue of her sex, a woman may be excused from exercising certain forms of guardianship.
3. The petitioners reported that the constitutionality of these legal provisions had been challenged before the Guatemalan Court of Constitutionality in Case 84-92, which had ruled that the distinctions were constitutional, as, inter alia, they provided juridical certainty in the allocation of roles within marriage. The petitioners requested that the Commission find the foregoing provisions of the Civil Code incompatible in abstracto with the guarantees set forth in Articles 1.1, 2, 17 and 24 of the American Convention.
II. PROCESSING BEFORE THE COMMISSION
4. Pursuant to the filing of their petition, on March 14, 1995, the petitioners sent the Commission a copy of the sentence issued by the Court of Constitutionality in response to Case 84-92. Case 11.625 was opened on May 6, 1996, and the pertinent parts of the petition were transmitted to the Government of Guatemala on that date, with a response requested within 90 days.
5. By means of a note dated August 6, 1996, the State indicated that it was compiling a substantial report in response to the petition, and requested an extension of the time accorded for its answer. In a note of August 7, 1996, the Commission indicated that an extension of 30 days had been granted.
6. In a note dated September 10, 1996, the State reported that the Executive was about to send to Congress a project of reforms to modify certain provisions of the Civil Code at issue in the present case. The Government explained that the reforms were aimed at modifying provisions of the Code which in some way contravened Article 46 of the Constitution, and provisions of the Convention on the Elimination of all Forms of Discrimination against Women and the American Convention. The Government indicated that, once submitted to the Congress, a copy of the draft reforms would be forwarded to the Commission. This information was transmitted to the petitioners in a note of September 17, 1996, with the submission of any observations in response requested within 45 days.
7. Pursuant to a request from the petitioners, the Commission granted a hearing to address the admissibility of Case 11.625 during its 93rd regular period of sessions. During that hearing, held on October 10, 1996, the Government of Guatemala recognized that the provisions of the Civil Code characterized by the petitioners as discriminating against women were out of date. For that reason, and having regard to Article 2 of the American Convention, the Executive reported that Deputies Nineth Montenegro and Olga Camey de Noack had elaborated a set of proposed reforms to the Civil Code, designated initiative number 1539, which referred to the majority of the provisions challenged by the petitioners. These reforms had been presented to the Commission on Legislative and Constitutional Points of the National Congress for its study and opinion. Further, the Presidential Coordinating Commission of Executive Policy in Human Rights Matters (COPREDEH) had prepared a set of complementary reforms to address certain provisions not dealt with in the pending draft which had been transmitted to the General Secretariat of the Presidency. The Government indicated its concern with respect to the discrepancies between the challenged provisions and the obligation of nondiscrimination, and that it hoped these projected reforms would lead to the adoption of corresponding measures in the near term. The petitioners indicated their interest in studying the proposed reforms and providing observations with respect to how the proposed changes adhered to the international standards in effect which have special bearing on the rights of women. The Government in turn indicated that these draft reforms would be provided to the Commission and the petitioners. The parties agreed that the Commission should review the matter during its next period of sessions in order to assess developments and evaluate the feasibility of resolving the case through the procedure of friendly settlement.
8. On October 10, 1996, the petitioners provided the Commission with a set of 12 signed statements (nine of which were notarized), from married women, single women, and professionals in the fields of family law and psychology, concerning the effects and implications of the challenged provisions of the Civil Code. Copies of these statements were formally transmitted to the Guatemalan State by means of a note dated October 15, 1996. Any observations in response, or further information deemed pertinent were requested within 60 days.
9. On December 13, 1996, the State transmitted a report to the Commission updating the efforts it had taken with respect to reforms to the Civil Code, reiterating information provided during the October 10, 1996 hearing, and indicating that it was hoped that the project of reforms would be taken up by the Congress when it initiated its next session. The Government also provided the Commission with the text of the "Law to Prevent, Sanction and Punish Intrafamilial Violence," approved by the Congress by means of Decree Number 97-96 and scheduled to enter into force on December 28, 1996. This submission was transmitted to the petitioners by means of a note dated January 9, 1997, with any observations in response requested within 45 days.
10. Pursuant to the January 24, 1997 request of the petitioners, the Commission held a hearing on the case on March 5, 1997, during its 95th regular period of sessions. The petitioners reported that the only project presented to the Congress to date with respect to the Civil Code had dealt solely with Article 114 (concerning the legal capacity of women to work and pursue activities outside of the home). The Commission on the Woman, the Minor and the Family had reviewed the project, and transmitted it to the plenary of the Congress on May 15, 1996. On May 20, 1996, the plenary had transmitted the project to the Commission of Legislative and Constitutional Points, which had issued an unfavorable report. The petitioners submitted a copy of a letter dated February 19, 1997 from the President of the Commission on the Woman, the Minor and the Family recounting these events, and a copy of the draft reforms to Article 114 of the Civil Code.
11. During the hearing, the Government indicated that, notwithstanding that the efforts referred to during the prior hearing had not prospered, it continued to pursue initiatives aimed at the reform of the legislation in question. The State also reported that the Attorney General had challenged Civil Code Articles 113 and 114 before the Court of Constitutionality in an action filed on November 16, 1996, the determination of which remained pending. The Commission questioned the petitioners as to whether they were requesting a determination in abstracto or pursuing an individual claim. The petitioners indicated that, in the concrete case, María Eugenia Morales Aceña de Sierra had been directly affected by the challenged legislation, and also represented other women victims in Guatemala. The Commission requested that they formalize the status of María Eugenia Morales de Sierra as the victim in writing, in order to comply with the dispositions of its Regulations and proceed to process the petition within its case system.
12. The petitioners formalized the status of María Eugenia Morales de Sierra as victim in a communication of April 23, 1997, the date as of which the Commission considers this status to have been established in the file. According to the petitioners, María Eugenia Morales de Sierra is a victim who, as a married woman with children who resides in Guatemala, is subject to a legal regime which limits her capacity to exercise her rights. The petitioners characterized the norms in question as being of immediate application, affecting the rights of the victim by virtue of her sex and civil status simply by being in effect. The petitioners supported their position with reference to the jurisprudence of the European and universal systems for the protection of human rights concerning the requirements of standing and admissibility. In a note of June 9, 1997, the pertinent parts of this communication were transmitted to the State of Guatemala, with any observations requested within 30 days.
13. On July 10, 1997, the Government submitted a brief communication indicating that the constitutional challenge interposed by the Attorney General against Articles 113 and 114 remained pending before the Court of Constitutionality, and that on May 29, 1997, the National Office of the Woman and a group of nongovernmental organizations had delivered a set of draft reforms to the Civil Code to Deputy Nineth Montenegro. The draft reforms had been transmitted to the Commission of Legislative and Constitutional Points for its study and opinion. The Government indicated that, given its continuing efforts and those of nongovernmental groups to modify Civil Code provisions which might discriminate against women, the petitioners had not exhausted domestic remedies. This submission was transmitted to the petitioners in a note of July 14, 1997, with any observations requested within 30 days.
14. On July 28, 1997, the petitioners provided the Commission with documentation complementing their April 23, 1997 submission, and consisting of a sworn declaration signed by María Eugenia Morales de Sierra, her birth certificate, marriage certificate, and birth certificates for her children. The declaration sets forth the effect of the legislative provisions at issue on the declarant's life, including, inter alia, the fact that the law prohibits her from representing the family or her minor child unless her husband is unable to do so; that she is unable to administer property obtained during the marriage or that of her children; and that the law would allow her husband to oppose her exercise of her profession at any moment. The declarant maintains that these restrictions have both legal and cultural consequences. The documentation was transmitted to the Government of Guatemala by means of a note dated August 14, 1997, with any response deemed pertinent requested within 30 days.
15. Pursuant to the request of the petitioners, the Commission held an additional hearing on the admissibility of the present case on October 10, 1997, during its 97th period of sessions. In a note dated September 18, 1997, the Government had indicated that it would respond to the additional information submitted by the petitioners during that scheduled hearing.
16. During the hearing, the petitioners produced three experts who testified as amici curiae to support the standing of María Eugenia Morales de Sierra as a direct victim in the instant case: Dinah Shelton, Center for Civil and Human Rights, Notre Dame Law School; Sian LewisAnthony, Interights; and Rhonda Copelon, International Women's Human Rights Law Clinic and the Concertación de Mujeres Activistas Para los Derechos Humanos. These experts recalled that members of a class targeted by legislation which is discriminatory on its face are deemed victims for the purpose of bringing petitions, citing, for example, the case of Dudgeon v. the United Kingdom (1982) 4 E.H.R.R. 149, para. 41. They further indicated that a putative victim need not demonstrate specified harm, nor even that specific measures of implementation have been taken, citing, for example, Marckx v. Belgium (1979), 2 E.H.R.R. 330, para 25, 27. In some cases, they noted, it may be sufficient to show the risk of a direct effect based on status, citing Klass v. Germany (1980), 2 E.H.R.R. 214, at para. 33. The petitioners asserted that, for the purposes of admissibility, where legislation creates a facial distinction with respect to a protected class, harm should be presumed. The prohibition against discrimination, they noted, is a nonderogable primary obligation. The petitioners sustained that the challenged provisions of the Civil Code play a central role in perpetuating and sustaining the inequality of women and men. Accordingly, while the provisions most immediately affect married women, in a larger sense they impact all women and Guatemalan society as a whole. Given their position that María Eugenia Morales de Sierra is in fact a victim with standing, the amici curiae indicated that resolving the questions raised did not require a decision in abstracto by the Commission.
17. The State, for its part, indicated that María Eugenia Morales de Sierra had acknowledged in her statement of August 28, 1997 that her husband had never actually restricted her professional activities under the terms of Article 114. The representative of the Government reported that the Congress continued to study diverse proposals to reform the Civil Code in order to correct or modify provisions which impede the ability of women to fully exercise their rights. In particular, in August of 1997, the National Office of the Woman had presented a comprehensive set of reforms to the Civil Code. Additionally, the Commission of the Woman, the Minor and the Family of the Congress was currently studying projects concerning the integral promotion of women and the family; the elaboration of a law concerning sexual harassment; and the creation of a National Institute of the Woman (initiative number 1793). Given the pendency of these projects, the State asked that the Commission postpone its decision on admissibility in the present case.
18. During the hearing, the Commission reaffirmed that the petitioners had amended their initial petition for a decision on the compatibility of the provisions at issue in abstracto to instead request a decision on the individual claims of the named victim. The Commission also requested the views of the petitioner with respect to whether the former should proceed to an immediate decision on the admissibility and merits of the case. They indicated that, in their view, the processing of the case had been sufficient and that it was ripe for decision. Pursuant to inquiry by the Commission, the State indicated that it remained disposed to consider the option of the friendly settlement procedure. The petitioners indicated their belief that this option had been explored sufficiently, and had failed to provide any fruitful results.
III. THE POSITIONS OF THE PARTIES
The Position of the Petitioners
19. The petitioners maintain that the cited provisions of the Civil Code discriminate against women, in a form which is immediate, direct and continuing, in violation of the rights of María Eugenia Morales de Sierra established in Articles 1.1, 2, 17 and 24 of the American Convention. The petitioners cite international human rights jurisprudence, including that of the InterAmerican Court, for the proposition that, while a difference in treatment is not necessarily discriminatory, such a distinction must be objectively justified in the pursuit of a legitimate end, and the means employed must be proportionate to that end. They contend that the provisions in question set forth distinctions between women and men, most immediately married women and men, which are illegitimate and unjustified. They note that the Court of Constitutionality found the challenged provisions justified as a form of protection for women, and as a means of establishing juridical certainty in the allocation of rights and responsibilities within marriage. The petitioners maintain that, even should these be deemed legitimate and sufficient justifications, the means employed are disproportionate. They assert that these provisions are contrary to the principle of equality between the spouses, and nullify the juridical capacity of the woman within the domestic legal order, thereby controverting the protections set forth in Articles 17 and 24 of the American Convention, as well as the obligations set forth in Articles 1.1 and 2.
20. The petitioners initially positioned their claims as a request for a decision in abstracto on the compatibility of the cited provisions of the Civil Code with the provisions of Articles 1.1, 2, 17 and 24 of the American Convention. Citing Advisory Opinions OC/13 and OC/14 of the Inter-American Court, they argued that the Commission could exercise jurisdiction over the matter through its general functions under Article 41 of the American Convention to: promote and oversee member state compliance with their human rights obligations; make recommendations to the states for measures in favor of the protection of human rights; and to act on individual petitions.
21. As recorded, the petitioners amended their position during the processing of the petition in 1997 to designate co-petitioner María Eugenia Morales de Sierra as an individual victim. Pursuant to that modification, the petitioners provided information which they assert demonstrates how the distinctions created by the challenged legislation restrict the ability of the victim to fully exercise the guarantees set forth in Articles 1.1, 2, 17 and 24 of the American Convention.
22. The petitioners maintain that the case satisfies all the requirements of admissibility, domestic remedies having been invoked and exhausted, and the victim having pleaded the direct effect of the impugned provisions on her ability to exercise her rights.
The Position of the State
23. The Government has not expressly controverted the substance of the claims raised by the petitioners. Rather, it indicates that steps are being taken by each branch of Government to respond to provisions of the Civil Code which contravene the Constitutional guarantee of equality, as well as provisions of the American Convention and other applicable international obligations. The executive branch has presented various draft reforms to the Congress for study. The Congress has reviewed and rejected some of these projects, and continues to receive and review others. The Attorney General has challenged the constitutionality of Articles 113 and 114 of the Civil Code in a claim filed before the Court of Constitutionality on November 16, 1996. In hearings before the Commission, the Government indicated that the executive had pursued certain initiatives within its mandate, and, in view of the system of separation of powers extant in the national system, could not interfere with those being dealt with under the jurisdiction of other branches of Government. The State maintains that the measures undertaken demonstrate its commitment to upholding the guarantees set forth in the Constitution, and in the American Convention on Human Rights and other applicable international law.
24. It is on the basis of these pending measures that the State controverts the admissibility of the case, contending that these demonstrate that domestic mechanisms continue to offer available and effective relief for the problem denounced. Accordingly, the State contends that the petitioners have not satisfied the requirement of exhausting the applicable internal remedies. Additionally, the State appears to contend that the Commission may lack jurisdiction ratione personae. During the October 10, 1997 hearing before the Commission, the Government indicated that, although the victim complains that Article 114 of the Civil Code constitutes an infringement of her right to work, in fact, she freely exercises her profession, and acknowledged in her written statement of August 28, 1997 that her husband had never impeded those activities. The presumed implication is that, if the victim has not been directly prejudiced as a result of the legislation, the Commission lacks jurisdiction ratione personae.
IV. CONSIDERATIONS WITH RESPECT TO ADMISSIBILITY
25. The Commission is competent to examine the subject matter of this complaint, as it concerns alleged violations of Articles 1.1, 2, 17 and 24 of the American Convention. The Republic of Guatemala deposited its ratification of the American Convention on May 25, 1978, and the Convention entered into force for all parties on July 18, 1978.
26. The petitioners' submissions include the information required by Article 32 of the Commission's Regulations, and meet the conditions set forth in Article 46.1.c of the American Convention and Article 39 of the Commission's Regulations, as the claims are neither pending settlement in another international inter-governmental proceeding, nor essentially duplicative of a petition pending or previously considered by the Commission.
27. Article 46 of the American Convention specifies that, in order for a case to be admitted, "remedies under domestic law [shall] have been pursued and exhausted in accordance with generally recognized principles of international law." This requirement ensures the state concerned the opportunity to resolve disputes within its own legal framework. The remedies generally required to be exhausted in accordance with the principles of international law are those which are available for and effective in addressing the allegations at issue. In 1992, María Eugenia Morales de Sierra, the Assistant Procurator for Human Rights and the victim in the present case, brought an action challenging the constitutionality of 12 articles of the Civil Code, in part or in full, including the nine articles at issue in the present case. The action was based on the contention that the provisions in question contravened, inter alia, the equality provisions of the Constitution, namely Articles 4 and 47. The claim was rejected by the Court of Constitutionality in a decision of July 24, 1993. The petitioners contend that they have invoked and exhausted the applicable domestic remedy.
28. Where a State claims that a petitioner has failed to discharge the requirement of exhaustion, the former bears the burden of indicating the specific remedies which remain available and effective. See, Article 37.3, Regulations of the Inter-American Commission, see e.g., I.Ct.H.R., Loayza Tamayo Case, Preliminary Objections, Judgment of Jan. 31, 1996, para. 40 (citing established Court jurisprudence). The State has not disputed that the constitutional mechanism invoked by the co-petitioner was the adequate jurisdictional remedy under the circumstances. Nor has it disputed that all of the claims now at issue before the Commission were raised in substance before the Court of Constitutionality. Rather, it contends that executive and legislative action aimed at reforming the provisions in question provide one avenue for redress, and that the constitutional action filed by the Attorney General in 1996 impugning Articles 113 and 114 of the Civil Code provides another. With respect to the executive and legislative action referred to, the Commission observes that the remedies generally required to be exhausted are those the judicial system offers to address the infringement of a legal right. With respect to the constitutional challenge brought by the Attorney General, the Commission observes that the co-petitioner and victim already challenged those provisions before the Court of Constitutionality. Given that the claims at issue before the Commission were placed before the Court of Constitutionality, thereby enabling the highest tribunal with jurisdiction to monitor and interpret the constitutionality of laws to render a determination of the rights at issue under domestic law, the Commission considers the requirement that domestic remedies be exhausted to have been satisfied. In effect, among its functions pursuant to the Guatemalan Constitution, the Court of Constitutionality acts as a court of original jurisdiction with respect to certain challenges to laws on constitutional grounds.
29. Article 46.1.b of the Convention establishes that a case must be filed in a timely manner, within six months of the date the interested party received notification of the final judgment within the domestic system. As the Commission has previously stated, this rule exists to allow for juridical certainty while still providing sufficient time for a potential petitioner to consider her position. The State, for its part, has not alleged failure to comply with the six-months rule. (Such a position would, in any case, be inconsistent with its argument that domestic remedies remain to be exhausted. See generally, I.Ct.H.R., Neira Alegria Case, Preliminary Objections, Judgment of Dec. 11, 1991, Ser. C No. 13, paras. 28-29.) While an issue of timeliness would have arisen had the petitioners specifically challenged the decision of the Court of Constitutionality or had they complained about specific past occurrences, they are in fact complaining about what they allege to be a continuing violation. See generally, I.Ct.H.R., Blake Case, Preliminary Exceptions, Judgment of July 2, 1996, paras. 29-40. They maintain that the legislation in question gives rise to restrictions on the rights of women on a daily, direct and continuing basis, and have provided victim testimony to that effect. Given the nature of the claims raised, which concern the ongoing effects of legislation which remains in force, the sixmonths rule creates no bar to the admissibility of this case under the circumstances analyzed above.
30. With respect to the question of jurisdiction ratione personae, the Commission has previously explained that, in general, its competence under the individual case process pertains to facts involving the rights of a specific individual or individuals. See generally, I.A.C.H.R., Case of Emérita Montoya González, Report 48/96, Case 11.553 (Costa Rica), in Annual Report of the IACHR 1996, OEA/Ser.L/V/II.95, Doc. 7 rev., March 14, 1997, paras. 28, 31. The Commission entertains a broader competence under Article 41.b of the Convention to address recommendations to member states for the adoption of progressive measures in favor of the protection of human rights.
31. Pursuant to their original petition for a decision in abstracto, which appeared to rely on the Commission's competence under Article 41.b of the American Convention rather than that under Article 41.f, the petitioners modified their petition and named María Eugenia Morales de Sierra as an individual victim, as previously noted, in their communication of April 23, 1997. With the identification of an individual victim, the Commission may advance with its decision on admissibility in the present case. As the Honorable Court has explained, in order to initiate the procedures established in Articles 48 and 50 of the American Convention, the Commission requires a petition denouncing a concrete violation with respect to a specific individual. I.Ct.H.R., Advisory Opinion OC-14/94, "International Responsibility for the Promulgation and Enforcement of Laws in Violation of the Convention (Arts. 1 and 2 of the American Convention)," of Dec. 9, 1994, para. 45, see also, paras. 46-47. With respect to the other contentious mechanisms of the system, Article 61.2 of the Convention establishes, further, that "[i]n order for the Court to hear a case, it is necessary that the procedures set forth in ... [those Articles] shall have been completed." "The contentious jurisdiction of the Court is intended to protect the rights and freedoms of specific individuals, not to resolve abstract questions." Id. para 49.
32. The petitioners argue that the victim has experienced and continues to experience violations of her rights to equality, and to equal protection of and before the law, under Articles 2, 17 and 24 of the American Convention, by reason of her gender. They allege that the challenged legislation has a direct impact on the ability of María Eugenia Morales de Sierra to exercise her rights. The victim alleges that, although her family life is based on the principle of reciprocal respect, the law prevents her from representing the marital union or her minor child unless her husband is unable to do so, and that the fact that the law vests this power in her husband creates a disequilibrium in the weight of the authority exercised by each spouse within their marriage, an imbalance which may be perceived within the family, community and society. The victim complains that the law provides that her husband has the exclusive competence to administer family property, and the goods of their minor child, and that, notwithstanding that the law requires women to bear primary responsibility for child care and the home, it excuses them from exercising certain forms of guardianship by virtue of their sex. The victim asserts that, although her right and duty as a mother is to protect the best interests of her children, the law strips her of the legal authority necessary to do that. The victim indicates that, although her husband has not opposed her professional activities, the law gives him the authority to do so at any moment. Accordingly, the victim maintains that the legislation in question constitutes an attack on her human dignity, and contravenes her right to a life free of discrimination based on gender. See Notarized Statement of May 5, 1997, signed by the victim.
33. With respect to the allegations concerning Article 114 of the Civil Code, the Government appears to argue that, as the victim's husband has never opposed her exercise of her profession, her rights have therefore never been infringed by the application of that provision. This argument, however, misses the substance of the complaint raised, and is rejected for that reason. In the first place, in virtue of the public order of human rights, even the eventual consent of a victim to a violation does not validate the violative act of a State, nor does it affect the competence of the international organ to whom the States have entrusted their protection. The victim asserts that the American Convention protects her right as a married woman to work and develop other activities outside of the home under equal conditions with men. Accordingly, she contends that the restrictions which Article 114 imposes on married women, but not upon married men, deny her the right to pursue professional and other opportunities on equal terms with men simply by virtue of being in force.
34. With respect to the claims as a whole, the Commission observes that a legal provision may affect an individual in different ways. A non-self-executing law will require measures of implementation by state authorities before it can be applied in a concrete case. OC-14/94, supra, para. 41. A self-executing law, on the other hand, may violate a protected right by virtue of its entry into force, if all other requirements (e.g. competence ratione personae) are complied with. Therefore, and taking into account the foregoing, "a norm that deprives a portion of the population of some of its rights -- for example, because of race -- automatically injures all the members of that race." Emphasis added. Id., para. 43.
35. In the instant case, María Eugenia Morales de Sierra alleges that the challenged provisions of the Civil Code create distinctions based on gender which infringe her rights to equality and to equal protection of and before the law simply by virtue of being in force. In this regard, international jurisprudence has established that a law may violate the right of an individual, even in the absence of any specific measure of subsequent implementation by the authorities, where the individual is directly affected, or is at imminent risk of being directly affected by a legislative provision. See generally, E.Ct.H.R., Case of Klass and Others, Judgment of 6 Sept. 1978, Ser. A Vol. 28, paras. 33-38; E.Ct.H.R., Marckx Case, Judgment of 13 June 1979, para. 27; see also, U.N.H.R. Committee, Ballantyne, Davidson and McIntyre v. Canada, 1993 Report, Vol. II, p. 102. María Eugenia Morales de Sierra is "challenging a legal position" -that of married women under the cited Articles of the Civil Code -- "which affects her personally." See, Marckx Case, supra, para 27. The Commission considers that the direct effect of the challenged legislative provisions on the rights and daily life of the victim has been adequately alleged and demonstrated for the purposes of admissibility in the present case, and will analyze its relevance and impact in the decision on the merits. In this phase, the Commission will not discuss matters related to human rights violations committed via self-executing laws.
36. Finally, as required by Article 47 of the American Convention, the petitioners have stated facts tending to establish a violation of the rights guaranteed by this Convention. Articles 109, 110, 113, 114, 115, 131, 133, 255, and 317 of the Civil Code establish differences in the treatment the law provides with respect to married women and married men, and in some cases, married and unmarried women. Under international human rights law, such differences must be analyzed to determine whether they pursue a legitimate aim, and whether the means employed are proportional to the end sought. I.Ct.H.R., Advisory Opinion OC-4/84, "Proposed Amendments to the Naturalization Provisions of the Constitution of Costa Rica," Ser. A No. 4, para. 56, citing E.Ct.H.R., Belgian Linguistic Case, Judgment of July 23, 1968, Ser. A No. 6, at 34. In other words, the law is expected to be even-handed between women and men unless just, legitimate and reasonable compelling bases have been adduced to justify a difference in treatment. See Van Raalte v. Netherlands, 24 E.H.R.R. 503, para. 42. The Commission will take up this question in its analysis of the merits of the case.
Additional Considerations
37. As to Article 48.1.f of the American Convention, which authorizes the Commission to place itself at the disposal of the parties for the purpose of facilitating a possible friendly settlement, the record reflects that the parties were notified of the Commission's disposition to assist them in this regard during the various hearings. The parties discussed various options with a view to pursuing this process, but never reached any agreement to enter into formal negotiations for this purpose. During the October 10, 1997, the petitioners indicated that, in view of the lack of progress on reforms within the domestic system, they were no longer interested in the possibility of friendly settlement.
38. Taking into account the foregoing analysis and conclusions,
THE INTER-AMERICAN COMMISSION ON HUMAN RIGHTS
DECIDES:
A. To declare the present case admissible.
C. To place itself at the disposal of the parties for the purpose of reaching a settlement based on respect for the human rights protected in the American Convention; and invite the parties to indicate their disposition to initiate the procedure of friendly settlement within a period of 30 days, counted as of the date of transmission of the present report.
B. To transmit this report to the State of Guatemala and the petitioners.
D. To continue with the analysis of the merits of the case.
E. To make this report public, and publish it in its Annual Report to the General Assembly of the OAS.
|
<urn:uuid:b7e78265-918e-4e35-a8d5-a94b383caa12>
|
CC-MAIN-2018-05
|
http://www.worldcourts.com/iacmhr/eng/decisions/1998.03.06_Morales_de_Sierra_v_Guatemala.pdf
|
2018-01-16T08:21:12Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886237.6/warc/CC-MAIN-20180116070444-20180116090444-00624.warc.gz
| 604,493,112
| 7,558
|
eng_Latn
|
eng_Latn
| 0.988928
|
eng_Latn
| 0.992694
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2936,
6405,
10662,
14784,
18251,
21987,
26005,
29606,
32468,
35882,
37348
] |
THE KAIJU AS BEHOLDER: FINDING EMPATHY IN GODZILLA
Joey Palluconi and Damian Schofield, State University of New York, Oswego, New York, USA
Abstract
Toho Studios created the first Godzilla film in Japan in 1954, the film was Japan's first international movie success story, and the franchise went on to inspire multiple sequels and dozens of other radioactive Daikaiju films. The Godzilla creature was particularly successful and garnered a huge following around the world. This paper examines the history of this iconic monster and attempts to understand some of the reasons for Godzilla's global popularity. This paper attempts to analyse and explain the multiple ways in which the audience has empathised with each of the different incarnations of Godzilla throughout the franchise's history. This is undertaken with particular reference to the oft-seen parenting roles performed by Godzilla in many of the major franchise films.
Keywords: Kaiju, Japan, Godzilla, cinema, Toho Studios
INTRODUCTION
The imagery is classic, a devastated city, fire spreading across a once perfect metropolis. All this happening in the shadow of a colossal creature beyond imagination. This popular image of monster cinema that graced so many late-night TV Screens was born out of a tragic event in Japan at the end of World War II.
The Kaijū Eiga (often translated as "Monster Movie") is one of the most easily recognizable genres of Japanese cinema. The term Kaijū in Japanese means "Strange Beast", and Eiga means "Project Picture" (Glownia, 2013). The first, and most famous, Kaijū Eiga film was Gojira (Honda, 1954). This monster movie was later re-edited, renamed, and released as "Godzilla, King of the Monsters" in 1956 in the USA (Honda and Morse, 1956).
The film Gojira (Honda, 1954) was crafted purely to place on screen a small fraction of the pain, loss and agony felt by the Japanese population after the dropping of the atomic bombs on Hiroshima and Nagasaki. Godzilla's initial appearance is a dark and violent portrayal of nuclear devastation. The early Japanese Godzilla films equate the monster with the atomic bomb, symbolically repeating the trauma, establishing the archetype of Japanese horror that explicates the present (Noriega, 1987; Anisfield, 1995; Shapiro, 2013). For many film historians and fans of the franchise, the first film attains an iconic cultural weight that few of the subsequent Godzilla sequels come close to.
It is easy to label Godzilla as simply a walking metaphor, a beast, a tsunami, an echo, and a reminder. However, that underestimates the purpose and potential of the creature throughout the entire franchise. Like many other filmic icons (Superman, Spiderman, or Darth Vader perhaps), Godzilla has become more than the words or images on the screen. The monster has evolved into more than a reminder of nuclear devastation, perhaps now providing an answer to the horrors of war (Nakano, 2008).
Godzilla is ultimately an animal, and in many of the films is often depicted as a victim. The filmic narratives often portray the giant creature as a sort of abused dog abandoned by humanity. His rampages can usually be seen in two different ways: either Godzilla is drawn to cities by instinct, or he lashes out in anger or pain unable to respond to any other stimuli (Kalat, 2017). Over the years however, like any sentient being, Godzilla has grown from his experiences and become more than the pure destructive force as he was initially presented. As the franchise films progress, Godzilla develops into a being that expresses a range of emotions and allows the audience to empathise with giant creatures on the screen.
THE SHŌWA ERA (1954-1975)
Outside of the Kaijū Eiga, the Shōwa Era usually refers to the period of Japanese history corresponding to the reign of Emperor Shōwa (Hirohito) from 1926 until his death in 1989 (Kosaka, 1990). In the Kaijū Eiga universe, the Shōwa Era begins with the first Gojira film in 1954 (Honda, 1954) and ends with Terror of Mechagodzilla in 1975 (Honda, 1975). There was then a decade-long hiatus before the next Godzilla film in the franchise was produced.
After the first couple of dark horror-based monster films, the Shōwa Era of Godzilla films are primarily recognised by their campy, comedic nature (Soles, 2021). There is a rich, western filmic history where the boundary line between horror and incongruity humor is drawn in terms of fear. In the horror genre, the audience's attention is focused, usually relentlessly, on the physical plight of characters harried by monsters. Ordinary moral concern for human injury at the hands of the monsters is never far from our minds as we watch these films (Hallenbeck, 2009).
However, readily identifiable creatures, such as the classic Universal monsters can be alternately horrifying or laughable depending upon whether the narrative context invests them with fearsomeness or not – for example, think of Abbott and Costello Meet Frankenstein (Barton and Lantz, 1948). Thus, fear is the métier of the horror films we watch. In order to transform horror into laughter, the fearsomeness of the monster (its threat to human life) must be sublated or hidden from our attention. Then we will laugh where we would otherwise scream (Carroll, 1999; Paul 1994).
King Kong vs. Godzilla (Honda and Montgomery, 1963), the third in both the Godzilla and King Kong franchises, was the starting point for the foray into a more comedic genre. This film featured indestructible materials, a corrupt TV network, a drunken King Kong, and some humorous stop motion action sequences. The rest of the Godzilla franchise films of this period would continue with this lighter tone (Kalat, 2017). Unfortunately, many critics and fans regretted the loss of the more serious and poignant tone that the original film had set. The importance of the original anti-nuclear sentiment appeared to be either lost or buried (Anisfield, 1995). However, even with the change in tone, the Godzilla films continued to deal with large, serious issues. Narratives in these films often dealt with topics such as pollution, corporate greed, and fatherhood.
This lighthearted focus for the Godzilla franchise was not without merit or reasoning, the Godzilla and Kaijū Eiga franchise was proving very popular among children. Godzilla's creator, the producer Tomoyuki Tanaka, saw this as an opportunity to increasingly change the character of Godzilla to have more appeal for children (Tanaka, 2005). Children see the world not necessarily more innocently than adults but more abstractly. To them Godzilla isn't a metaphor for nuclear destruction but an upgraded version of their beloved dinosaur and dragon toys (West, 2008). In many ways, this focus on a younger audience helped to put Godzilla on, what we can call, his path of personal growth.
The films in the Shōwa Era can be seen to demonstrate a gradual progression of the identity of the monster itself. Over the films of this period, Godzilla evolves from disturbed giant animal to a defender of the earth, the narrative can be read as an underdog story about a victim of nuclear destruction (Anisfield, 1995). Godzilla, throughout these films, can be seen as a victim rising above their pain to be a warrior, a defender, a savior, a friend and even a father.
Godzilla became a father when his adopted son, Minilla, first appeared in the film Son of Godzilla (Fukuda, 1967). In this film Godzilla is portrayed as a loving parent, a father who won't abandon his child. The imagery of Godzilla embracing his son, Minilla, as their island home is frozen by a weather machine is a truly heart-warming image. In many ways this marks a turning point for how the audience perceives and relates to the monster on the screen. Godzilla can be viewed with empathy, as a father – and as a metaphor for Japanese citizens overcoming the trauma of the dropping of the nuclear bombs (Low, 1993).
Godzilla's Revenge (Honda and Fukuda, 1969) is one of the lowest ranked films of this period. Ichiro, a young boy whose parents are always working, drifts into a dream where he meets Godzilla's son, Minilla, and overcomes both a dream bully and real-life robbers. However, despite the heavy use of stock footage and comedic antics this movie contains a strong social and political commentary. The film depicts the burden of industrial Japanese society on children. Ichiro's neighborhood is heavily polluted and is littered with abandoned factories. Through Godzilla and Minilla, Ichiro finds solace as a fellow outcast. As Godzilla trains his son and defeats his enemies, this mirrors Ichiro's subconscious ideal, a fantasy where he spends time with his own absent father (Kalat, 2017).
The final film in the Shōwa Era is 1975's Terror of Mechagodzilla (Honda, 1975). This film sees Godzilla fighting against duplicates of the creature he once was - a mindless machine, a terrifying dinosaur. The film portrays a disturbed mad scientist, Dr. Mafuni (like Dr. Serizawa from the first Gojira film) who turns his back on humanity after being forced out of the scientific community, losing his wife, and almost losing his daughter. Godzilla, on other hand, overcomes the negative versions of himself and retreats back into the sea to gain some peace away from mankind.
Living on his fictional island, Godzilla is often seen as an abomination of man and nature. However, it is possible to provide an alternative reading, that Godzilla represents someone who has escaped the polluted cityscape to find peace. As more children are born in this age of climate change, Godzilla can perhaps be seen as an inspiration. In the Shōwa Era, Godzilla is even seen fighting an alien that fed off pollution in the film Godzilla vs. Hedorah (Banno and Honda, 1971).
For many children around the world the Godzilla films act as a gateway to cinema. For others, perhaps he is a symbol of their own insecurities, a beast who has been hurt by society, but who still fights even when the world and humanity continue to attack him (Benzon, 2007).
OTHER KAIJŪ FILMS OF THE SHŌWA ERA (1954-1975)
During the Shōwa Era, Godzilla was not the only monster headlining his own films in Japan. Toho also produced a set of kaijū movies to capitalise on the success of the Godzilla franchise. Many of these films were also headed by director Ishirô Honda and carried his trademark as a filmmaker. Honda was a close friend, partner, and student of one of the greatest filmmakers of all time, Akira Kurosawa. Ishirô Honda's work has a strong correlation with many of Kurosawa's films (Ryfle and Godziszewski, 2017). Both directors often focused on nature, industrialization, and finding humanity in unusual places. Ishirô Honda's many monster films often showed the dangers inherent in industrial progress. The monsters that were featured in Honda's non-Godzilla films were again often more victims than destroyers (Galbraith, 2008).
For example, in the film Rodan (Honda, 1956a), two Kaijū are shown as lovers. When the Japanese Self-Defense Force (JSDF) finally defeats one of the monsters by triggering a volcanic eruption, its mate cannot bear to live without the other and purposely plunges itself into the volcano.
The film The War of The Gargantuas (Honda, 1966) is a classic story of nature versus nurture. The sons of Frankenstein's monster are raised in two different environments. While one monster (Sanda) was raised in an environment of love and compassion among humans, the other (Giara) was raised in the wild. Sanda seeks to save and love his brother but when Giara cannot reform and continues to attack human cities, the two brothers fight which eventually leads to both their deaths.
Many of these monsters who were perceived as evil villainous in standalone kaijū films from the Shōwa Era - for example, Gorosaurus (Honda, 1956b), Manda (Honda and Matsubayashi, 1963), Varan (Honda and Oda, 1958) and Baragon (Honda, 1958) are alternatively seen as saviors in the film Destroy all Monsters (Honda and Fukuda, 1958), fighting against the villainous King Ghidorah.
Ishirô Honda laid the groundwork for the whole kaijū Genre with Godzilla and the other monster films of the Shōwa Era. The kaijū genre continued to evolve throughout this period of films, overseen by director Ishirô Honda and his producer, Tomoyuki Tanaka. On a passing view, the films appear to be black and white, classic conflicts of man against monster. However, a deeper analysis reveals each of these kaijū to be a large animal, with hopes and desires, as nebulous in concept as nuclear energy itself (Noriega, 1987; Anisfield, 1995; Crowder et al, 2016).
THE HEISEI ERA (1984-1995)
The hiatus in Godzilla film production from 1975 to 1984 saw an increase in political tensions across the globe with the escalation of the New Cold War. This was a period of intensive reawakening of Cold War tensions and conflicts in the late 1970s and early 1980s. A different kind of fear was now prevalent, instead of seeing the devastation a nuclear weapon could bring, society was constantly waiting and expecting that destruction. This was an idea that grew and festered in the minds of many civilian populations around the world (Whitfield, 1996; Guthrie-Shimizu, 2006; Durkin, 2021).
Godzilla returned to the screen in 1984's film The Return of Godzilla (Hashimoto, 1984). With a new director, Koji Hashimoto, taking over from Ishirô Honda, Godzilla returned to more animalistic roots. In this film, the monster is seen as a beast driven and grounded by instinct. This version of Godzilla was more animalistic, not just in terms of violence, but in all aspects of the monster's behavior. For example, Godzilla is drawn to the sounds of birds because of an inherited genetic aspect of his saurian brain. This aspect of Godzilla, an alignment with nature, would be present in all the films of the Heisei era (Tsutsui, 2004; Kalat, 2017).
Throughout the films of this period, Godzilla has claimed the country of Japan as its rightful home. The battles that Godzilla undertakes in these films focus heavily on the idea of an animal protecting its territory. The Cold War led to an increasing sense of protectionism within Japan, a trait mirrored in the Godzilla films of the time, as the monster defended Japan's borders from external invaders (Guthrie-Shimizu, 2006; Durkin, 2021).
For the majority of the films of the Heisei Era, other kaijū demonstrate their empathic natures more than Godzilla. For example, Biollante (Ohmori, 1989) is a human soul trapped within a genetic rose hybrid. King Ghidorah (Ohmori, 1991) is mutated from harmless pets into a monster, then controlled and abused by its captors to the point of full body mutilation and a complete loss of autonomy. Once again referencing an environmental narrative, the kaijū Battra and Mothra (Okawara, 1992) are extensions of the Earth's life force and feel the pain inflicted on it by humanity. Throughout these early films, Godzilla remains true to his animalistic nature, a metaphorical wave of destruction providing limited potential for the audience to empathize directly with the monster as they did in the films of the Shōwa Era (Kalat, 2017).
However, the Heisei Era films do allow the audience to have a different kind of understanding of Godzilla's motivations. The film Godzilla vs Biollante (Ohmori, 1989) introduces Miki Seagusa as the first recurring character of the Godzilla franchise. Miki appears in every film of Heisei Era, where her character is a psychic who can access Godzilla's mind. Over the sequence of films, her character develops from initially merely following the emotions of Godzilla, to genuinely feeling for the creature and wanting to understand him. Miki experiences the rage and pain that lies within the heart of the creature, and shares this pain with the audience, rage and pain that stems from betrayal (Smith, 2002; Ragone, 2007).
Godzilla's sense of betrayal is explained in the film Godzilla Vs. King Ghidorah (Ohmori, 1991), where time travelers travel back to before Godzilla was mutated. They discover that the monster was a dinosaur called a Godzillasaurus living on Lagos Island. In keeping with the Cold War protectionist themes of the Heisei Era, the dinosaur is seen defending Japanese troops from invading American forces. Godzillasaurus is badly injured, and then abandoned and left to die by the Japanese forces when they receive new orders. The modern incarnation of Godzilla continues to live with constant anger at being discarded by those he trusted. This feeling of betrayal is so strong that when Godzilla once again meets the commander of those forces in the film, he incinerates him without a thought (Guthrie-Shimizu, 2006; Durkin, 2021).
In the films of the Heisei Era, Godzilla exhibited less of the human-like emotions that were increasingly on display through the films of the Shōwa Era. Godzilla functions as an animal, angry and hurt - a fallen soldier that feels betrayed by the people he saved and now seeks retribution (Ragone, 2007). There is little chance for the audience to feel empathy with the monster until the film Godzilla Vs. Mechagodzilla II (Okawara, 1993) where Godzilla once again undertakes the mantle of fatherhood.
During the Shōwa Era, the pandering to a younger audience, particularly the introduction of Godzilla's son, Minilla, was not well received among critics and the adult audience. However, towards the end of the Heisei Era, a new representation of Godzilla's son was introduced into the franchise, this time simply called Godzilla Junior (West, 2008). In the last three film of the Heisei Era, the audience are able to once again empathize with Godzilla as a parent. Godzilla Junior behaves in a very different manner to his father, causing Godzilla to question his own animalistic actions and alter his behavior to care for his son (Tsutsui, 2004).
In the film Godzilla Vs. Mechagodzilla II (Okawara, 1993), the kaijū are seen in far more empathetic light, repeatedly demonstrating their feelings towards other creatures, and making decisions based on emotions other than rage and anger. The film shows that the Godzillasaurus species is similar to a cuckoo bird, in which it lays its eggs in other nests. The monster Rodan is again introduced and is now cast as an adoptive older brother to Godzilla Junior, their eggs having been in the same nest. A team of scientists take Godzilla Junior to a research center, both Godzilla and Rodan display familial attachment and attempt to rescue the child. Godzilla is defeated, and Rodan sacrifices his life to revive Godzilla to save the infant's life. While the human characters in this film repeatedly show a lack of empathy (experimenting on Godzilla Junior and using the child as bait) the kaijū are represented in a far more positive and empathetic manner (Bernardi, 2006).
The final two movies in this era show Godzilla actively raising and protecting his son. Godzilla Vs. SpaceGodzilla (Yamashita, 1994) sees Godzilla attempting to protect his son as he is kidnapped and imprisoned by his evil counterpart, Spacegodzilla. Spacegodzilla is a destructive, animalistic force, which Godzilla is tasked with stopping. In contrast to the earlier films of this era, Godzilla's motives are now aimed at living in peace and raising his son.
The final film in this era, Godzilla vs Destoroyah (Okawara, 1995), Godzilla's heart, which is a nuclear reactor, is going into meltdown. While the human authorities seek a solution to this, Godzilla cares only about the safety of his son. In the film, Godzilla Junior is killed by Destoroyah. Godzilla's rage over the loss of his son helps him to defeat the evil monster. Godzilla dies after the battle, but the nuclear fallout from his death revives Godzilla Junior as a fully matured kaijū. In a final, ultimate, act of parental compassion, Godzilla's death brings nuclear rebirth to his offspring.
From the early animalistic, brutal destruction of the Godzilla incarnations in the early films of the Heisei Era, the audience has seen a complete reversal in how they are now meant to perceive this creature. The final film of this era also returns to the nuclear themes of the initial 1954 film, however, the nuclear energy from Godzilla is now seen as a source of rebirth, rather than a weapon of destruction (Anisfield, 1995; Shapiro, 2013).
THE AMERICAN GODZILLA (1998)
The Japanese Godzilla franchise would now take another short production hiatus to allow Hollywood to create their own Godzilla (Emmerich, 1998) film. The film attempted to update the image of Godzilla from the traditional Japanese representation of a man in a rubber suit, to a modern computer-generated creation, something along the lines of the successful Jurassic Park franchise (Spielberg, 1998).
The production became very controversial for a number of reasons. In the film, the nuclear testing that creates Godzilla is now blamed on France (Shapiro, 2013; Jones, 2015). Also, the dramatic change in the design of Godzilla led many fans to name the creature from the Hollywood produced film GINO - Godzilla In Name Only (Maletich, 2011).
Godzilla was portrayed as an asexual male in this film which caused some misinterpretations among the audience who often referred to the creature as a "she", despite the fact that Godzilla was evidently supposed to be a male (Brophy, 2000). Reproducing asexually, this film represents Godzilla as an active biological parent.
The Hollywood Godzilla returns to the role of an animal, bringing havoc and destruction around the world. However, throughout the film, Godzilla repeatedly avoids military engagement because he is pregnant and does not wish to risk the life of his unborn spawn. As the eggs hatch in Madison Square Garden, an air strike is called, and all of Godzilla's children are killed. The audience is asked to once again empathize with Godzilla, as the monster seeks retribution against the human characters who destroyed his offspring (Srivatsan and Venkatesh, 2021). As Godzilla dies, he stares into the eyes of the main character, Dr. Niko Tatopulous. The eyes are full of pain and loss.
GODZILLA: THE SERIES (1998-2000)
Godzilla: The Series (Devlin et al, 1998-2000) was an American-Japanese animated TV series that aired on Fox Kids in the United States, as a sequel to the 1998 Godzilla film. The show featured Dr. Nick Tatopulous from the previous film, working with a team of scientists in order to combat many other giant mutated creatures.
The American show, following the lead of the previous Japanese film series introduced another child of Godzilla. In this TV series, a lone sterile Godzilla infant is shown to have survived the bombing of Madison Square Garden. In a weird break from the paternal
relationships shown in the previous Godzilla films, Dr. Nick Tatopulous imprints himself on the infant creature as its father. The two continue to share a father son relationship throughout the TV series. Nick constantly risks his life, in episode after episode, to ensure that the infant Godzilla is safe.
During a three-episode arc in which Aliens revive the original Godzilla as a cyborg, the paternal bond between Nick and the infant Godzilla is tested. In the end however, the infant choses Nick over his re-animated cyborg father. This interspecies bond shown on screen, mirrors the parasocial relationship the human audience experiences as their empathy for the young creature develops over the episodes of the TV series (Gerow, 2006).
THE MILLENNIUM ERA (1999-2004)
Godzilla would not remain in Hollywood for long, Toho Pictures in Japan rebooted the Godzilla franchise for a second time with the 1999 film Godzilla 2000: Millennium (Okawara, 1999) starting the third era of Godzilla films, known as the Millennium Era. These Godzilla films are treated as an anthology series where each film is a standalone story, with the original 1954 Godzilla film (Honda, 1954) serving as the only previous point of reference. Godzilla Against Mechagodzilla (Tezuka, 2002) and Godzilla: Tokyo S.O.S. (Tezuka, 2003) are the only films in the series to share continuity with each other, these two films are known as the Kiryu Saga (Kalat, 2017).
The Kiryu Saga is a complex duology that focuses on the sanctity of life. This saga sees Japan reeling from multiple monster attacks over the years. This incarnation of Godzilla is once again a destructive force, regularly attacking major cities in Japan. In order to combat the kaijū threat, the Japan Self-Defense Force builds a cyborg, Kiryu. However, unlike previous incarnations of Mechagodzilla from the Shōwa Era and Heisei Era, this version is a cyborg built upon the bones of the original Godzilla, from the 1954 movie. Hence, we see a completion of the cycle, where the nuclear threat from the first Godzilla film is now transformed, through technology, into the machine that will save Japan from the threat posed by a new Godzilla (Shapiro, 2013).
However, there is a possible ghost in the machine. The sound of the roar made by the new Godzilla incarnation causes the memories of the original 1954 Godzilla to resurface in the cyborg. The original 1954 monster is very much an animalistic being, a dinosaur, a destructive force of nature created by nuclear testing. However, this film challenges the way the monster was interpreted and understood in the original Godzilla film (Honda, 1954), the audience begins to understand how much pain the original monster suffered. This cyborg, Kiryu, behaves throughout the Kiryu Saga with intense emotion and intelligence as the memories are awoken (Jones, 2015).
The audience is forced to question the nature of the cyborg Godzilla. Is it a machine? Is it alive? Does it have a soul? In the second film of the Kiryu Saga, Godzilla: Tokyo S.O.S. (Tezuka, 2003), Mothra returns and demands that the bones of the original 1954 Godzilla be put to rest. In the film, the original Godzilla is honored as a monster who in its last moments choose to end its life by protecting Japan. The audience is left in no doubt that this creature deserves as much respect in death as any other sentient being. Once again, as in the films of the Shōwa Era and Heisei Era, the audience is asked to re-evaluate Godzilla; to leave behind the links with the nuclear past and the memories of destruction, and to re-imagine Godzilla as a source of national pride (Shapiro, 2013; Jones, 2015).
However, a post-credits scene from the film Godzilla: Tokyo S.O.S. (Tezuka, 2003), seems to suggest that no matter how much empathy and respect is now given to Godzilla in these films, humanity will never learn from its previous experiences with the kaijū. An undisclosed laboratory is shown with canisters containing the DNA of numerous kaijū. In the Japanese version, an unidentified voice announces that a "bio-formation" experiment involving an "extinct subject" is about to take place again.
The 2004 Millennium Era film Godzilla Final Wars (Kitamura, 2004) reintroduces Godzilla's son, Minilla. The film also illustrates the recurring environmental narrative, where Godzilla is represented as a force for good, protecting the planet from the ravages of human destruction (Murray and Heumann, 2016).
The narrative of Godzilla Final Wars (Kitamura, 2004) primarily focuses on the crew of the Gotengo battleship luring Godzilla around the world to fight monsters controlled by an alien force. However, a subplot runs through the film involving a hunter and his grandson escorting Minilla across the country. At one point the grandson pointedly asks why Godzilla is so angry. The grandfather responds with the line "They made a huge fire and burned everything on the land. Godzilla will never forget it."
Godzilla's anger at humanity is repeatedly shown to stem from pain inflicted upon himself and his home. His hatred is genuine and, in many ways, understandable. Towards the end of the film, Godzilla's son, Minilla, is once again introduced as the voice of reason and compassion. Minilla appeals to his father to stop seeking vengeance, once again Godzilla's parental empathy overcomes his destructive rage, and the two return to the sea.
THE MONSTERVERSE (2014-2021)
The MonsterVerse is an American multimedia franchise and shared fictional universe that is centered on a series of monster films featuring Godzilla and King Kong, produced by Legendary Entertainment and co-produced and distributed by Warner Bros. Pictures. The first installment was Godzilla (Edwards, 2014), another American reboot of the Godzilla franchise, which was followed by Kong: Skull Island (Vogt-Roberts, 2017), Godzilla: King of the Monsters (Dougherty, 2019), and Godzilla vs. Kong (Wingard, 2021).
The Monsterverse series of films follows an organization called Monarch as it studies and does battle with Titans. Titans are massive organisms born from a power source in the hollowed earth that are created to balance the earth's ecosystem. They once shared a symbiotic relationship with humanity, however that time is over, and their re-emergence threatens to spark conflict and disaster (Koenig-Woodyard et al, 2018).
This series continues the trend of distancing the Godzilla franchise from its early Japanese anti-nuclear message. Here, Godzilla was not created by American nuclear bomb tests, but from a natural process occurring deep within the earth. The Monsterverse film series has been repeatedly criticized for generally having a more positive outlook on nuclear energy (Peacock, 2021).
The Monsterverse films explicitly avoid any direct mention of nuclear testing or any sort of anti-nuclear message. The films also partake in revisionist history in which the Castle Bravo nuclear tests were done in an attempt to kill Godzilla. However, a few images and symbols of nuclear devastation do still appear. In the film Godzilla: King of the Monsters (Dougherty, 2019), a device called the Oxygen Destroyer makes an appearance, this is a reference to the weapon of mass destruction used to kill Godzilla in the original 1954 Godzilla (Honda, 1954) film. When this device is used in the Monsterverse film the audience sees a huge mushroom cloud rising above the site of impact (Peacock, 2021).
If anything, the Monsterverse films illustrate nuclear energy as a positive or complex force actually showing that it could be effective in defeating global warming. In Godzilla: King of the Monsters (Dougherty, 2019) the kaijū King Ghidorah again makes an appearance, and is portrayed as a terraformer of the planet, representing climate change. The other titans are shown as being capable of healing the planet using radiation that they emit. However, with King Ghidorah controlling them, they are also shown as being capable of destroying the planet. Showing the positives and negatives of nuclear energy.
This representation of nuclear power in these movies, and the shift in the origin story of Godzilla has been repeatedly criticised. One could argue that it seems like the American filmmakers are ignoring America's part in creating the Godzilla monster by dropping the nuclear bombs on Japan during the second world war. This has been called by critics and fans as a cheap attempt to rewrite history. (Koenig-Woodyard et al, 2018; Schneiderwind, 2020; Peacock, 2021).
The Monsterverse incarnation of Godzilla is depicted as the sole survivor of a prehistoric superspecies, once again acting as a force of nature that maintains ecological balance. The films contain an ever-present fear that Godzilla might turn upon humanity and wreak destruction on population centers. Godzilla is forced to watch as humans continue to destroy the environment, while the titans are constantly attempting to repair the damage. As the film series progresses, Godzilla appears to become more frustrated with the damage humanity inflicts on the earth and is even forced to watch as human organisations build weapons designed to kill him. The monster is here portrayed as a weary warrior who has seen it all and is now wondering if any of it is worth fighting for. The computer-generated Godzilla of the Monsterverse exhibits many human emotions throughout the film series; the audience sees him tired, sad, and even sees him laugh.
Nowhere is this new humanity in the creature illustrated as well as in one of the final scenes from Godzilla: King of the Monsters (Dougherty, 2019). Dr. Ishirō Serizawa (played by Ken Watanabe) is a scientist and survivor of the Hiroshima nuclear bomb droppings. He has devoted his life to studying Godzilla, and feels a deep empathic, even familial, connection to the monster. Dr. Serizawa sacrifices himself to save Godzilla. In one of the most emotional scenes of any Godzilla film, the monster stares at Dr. Serizawa as he dies, fully aware of the sacrifice the scientist is making for him.
Throughout the franchise, Godzilla has been repeatedly hurt and betrayed by humanity. In the end, he is saved by a man who understands the suffering that Godzilla has gone through. Dr Serizawa dies knowing that Godzilla appreciates his sacrifice.
SHIN GODZILLA (2016)
While Hollywood was busy creating the Monsterverse, Japan went back to basics with the film Shin Godzilla (Anno and Higuchi, 2016). The film is considered as the first in a new era of Japanese Godzilla movies, the Reiwa Era. Outside of the Kaijū Eiga, the Reiwa Period usually refers to the current era of Japan's official calendar. It began on 1 May 2019, the day on which Emperor Akihito's elder son, Naruhito, ascended the throne as the 126th Emperor of Japan (Anzai, 2021).
Shin Godzilla (Anno and Higuchi, 2016) was seen by fans and critics as a return to the monster's classic creature-feature roots, a mirror to the Hollywood versions of Godzilla, and a revival of a more traditional Japanese Godzilla (Lofgren, 2020; Pelea, 2020; Greene, 2021). Kazuo Ozaki summed up this sentiment, writing, "Hollywood, even with all its money, can't approach this kind of perfection." (Schilling, 2016).
Whereas Godzilla was originally conceived as a metaphor for the atomic bombings of Hiroshima and Nagasaki, this modern incarnation of Godzilla drew inspiration from the Fukushima nuclear disaster and the Tōhoku earthquake and tsunami. The widespread devastation left in the wake of Godzilla, the huge piles of debris, the government spokesmen convening emergency press conferences; this all seems to be taken from a modern television news report (Schneiderwind, 2020).
Shin Godzilla (Anno and Higuchi, 2016)., with its reality vs idealism themes, is the most political movie in the franchise since the original film Godzilla was released in 1954 (Honda, 1954). At a time when Japan faces existential threats from China's expansionist policies and increasing intimidation from North Korea, this film was seen as creating a new Godzilla for a new, more nationalistic Japan. While the film has plenty of large-scale destruction, its true focus is on laying the foundation for a new Japan and radiating confidence in the country's future (Schneiderwind, 2020; Pelea, 2020). Japan's Prime Minister Shinzō Abe has even spoken positively of the film's pro-nationalist themes, stating, "I think that [Godzilla's] popularity is rooted in the unwavering support that the public has for the Self-Defense Forces" (Fifield, 2016). Shin Godzilla (Anno and Higuchi, 2016) completes a 60-year emotional and national arc. Japan is shown developing new attitudes toward its military, towards America, and its energy sector (Schneiderwind, 2020).
Midway through Shin Godzilla (Anno and Higuchi, 2016), American B2 stealth bombers drop their payload on the monster as it destroys downtown Tokyo. The creature launches a counterattack, tantamount to a nuclear explosion, and through the computer-generated fire and smoke the implication becomes clear: Japan can no longer rely on the United States to keep it safe (Ryfle and Godziszewski, 2017).
At one point in the film, the American special liaison attempts to sacrifice Tokyo to serve her own self-centered political ambitions. She becomes the film's representation of America and its selfish, individualist values. Japan's leaders in the film question America's commitment to help defend the country, they suggest it's time all American bases and troops leave the country. Shin Godzilla 37 imagines a world in which Japan gets out from under Washington's thumb (Fifield, 2016; Hioe, 2016; Ryfle and Godziszewski, 2017).
This is reinforced by the leaders of Japan's Self Defense Force espousing themes of national and cultural pride, the film shows Japan flexing its military muscle and breaking ranks with the U.S. to save itself from destruction through a combination of political, diplomatic, and scientific means (Ryfle and Godziszewski, 2017; Lofgren, 2020).
Shin Godzilla (Anno and Higuchi, 2016) also acts as a satire of Japanese politics, where the greatest threat to Japan comes not from without but from within, from the old-school government bureaucracy who are unable to act decisively or to stand up resolutely to foreign pressure (Tsutsui, 2016). The film calls for change in the face of disaster, the incompetent bureaucrats are replaced by young people who have learned from the mistakes of their forefathers. The message is clear, the monsters of the past and present can be defeated by heroes of the future (Ryfle, S. and Godziszewski, 2017).
The film seems to discard all previous incarnations of Godzilla as a caring parent, a pacifist, an environmental activist, or a victim with human-like emotions and understanding. In its place is a lifeform with no expression, an unfeeling animal that mindlessly evolves in order to survive. Godzilla appears to have once again become an "ambulatory tsunami, earthquake and nuclear reactor, leaving radioactive contamination in his wake" (Schilling, 2016). The kaijū becomes a metaphor for the government's inability to act during the Fukushima nuclear plant incident (Hioe, 2016).
Throughout Shin Godzilla (Anno and Higuchi, 2016) the kaijū constantly evolves to combat the harsh environments and military bombardment. Unfortunately, evolution is not kind, throughout the film Godzilla appears scarred and in pain.
On the surface, Shin Godzilla (Anno and Higuchi, 2016) seems to have abandoned the empathy demonstrated in many of the past films. However, Godzilla is in fact portrayed as a being caught between the political machinations of two countries. In this sense, Godzilla is portrayed as a victim of government, who is used by both sides for political gain.
The main sign of any emotion that can be attached to Godzilla in this film is in the translated lyrics of the song that plays during the atomic ray display. The song lyrics explain how Godzilla is scared, and doesn't know where he is, or what is happening to him. Godzilla contemplates his own death and wonders if anyone will remember or mourn him.
NETFLIX TRILOGY (2017-2018)
Between 2017 and 2018 Netflix released a Godzilla Anime trilogy consisting of the films Godzilla: Planet of the Monsters (Seshita and Shizuno, 2017), Godzilla: City on the Edge of Battle (Seshita and Shizuno, 2018a), and Godzilla: The Planet Eater (Seshita and Shizuno, 2018b). These films are also known as the Anigoji Trilogy (the term Anigoji comes from combining the words Anime and Gojira) and are considered to be part of the Reiwa Era of Godzilla films (Morehead, 2019).
Once again, a new origin story is created, this incarnation reinvents Godzilla (now known as Godzilla Earth) as an apex kaijū born from plant life, part of a cosmic ecosystem. Godzilla is now the final form of evolution on every planet. The Godzilla in these films is the largest that he has ever been, so large that he towers over mountains and is capable of terraforming planets.
Godzilla Earth is again initially an animalistic force of nature, fighting against humanity. Most of humanity leaves earth aboard a space vessel which returns many thousands of years later (due to time dilation) to try again to defeat Godzilla. The attack on Godzilla is led by Captain Haru who witnessed his whole family killed by Godzilla before the spaceship left earth, his hatred for Godzilla consumes him (Looch, 2019; Morehead, 2019).
However, the Godzilla now battled by Captain Haru, is not the same as he was 20,000 years ago. Godzilla has again become a parent, of sorts. Godzilla Filius is a spawned clone of the original. Filius's death at the hands of Captain Haru causes the original to rise from his slumber. Godzilla Earth now exhibits large, blue, human-like eyes and a beard, which emphasises the wisdom that comes with age. Godzilla Earth is now an elderly sage, forced to survive throughout the years, after enduring all manner of pain. The monster now simply wishes to rest in peace, he is again portrayed as a balance to the ravages of humanity (Looch, 2019).
In the final film of the trilogy, Godzilla: The Planet Eater (Seshita and Shizuno, 2018b), Haru learns that the cycle of hatred must be broken and kills himself to stop the endless violence. The final message is that as long as hatred and anger exist there can be no peace.
CONCLUSIONS
For many children, their first experience of a giant monster or kaijū is not Godzilla, it was learning about dinosaurs in school. The first time any child experiences a real dinosaur skeleton in a museum, they are filled with wonder and curiosity. The Godzilla franchise provides a way for audiences to re-experience that sense of wonder and form a connection to the long extinct roamers of the earth.
In 1954, H-Bomb testing in the pacific by the American military, brings a dinosaur to life on the silver screen in Japan. Godzilla is born and transformed into a force of nature. In a perverse twist, there is a glaring scientific warning, by unintentionally distorting nature, mankind can engineer its doom (Maletich, 2011). The mutation of Godzilla can also be seen to signify humanity's inability to conceive extinction, we fear it, but we rarely acknowledge it (Viragh, 2013; Okuno, 2016).
It is a popular misconception to underestimate this franchise, generalizing the film's themes to be solely related to the recalcitrant feelings of the post-war Japanese population about the dangers of nuclear bomb. This paper has tried to illustrate how the themes within the franchise have evolved, allowing much more complex leitmotifs and representations to be identified (Noriega, 1987; Anisfield, 1995).
Some of the Godzilla films focus on the animalistic nature of Godzilla, he lives, eats, breathes, and feels pain. The kaijū are often portrayed as devastating forces, trapped in a cycle that they can't stop, destined to destroy over and over again. But Godzilla is more than this, the audience is repeatedly shown that he can be hurt even killed. Often crying out in pain, as he is once again attacked by a human military force. But, over and over again, we see in the narratives of these films that Godzilla does not usually initiate these attacks, but instead has been provoked and taunted to rise from the ocean and obliterate the creations of humanity (Smith, 2002).
Throughout Godzilla's existence he has been many things: a storm, a warning, life, death, nature incarnate, a marvel, or an unstoppable force of destruction (Moser and Zelaya, 2020). A conceptual metaphor analysis demonstrates that often the different incarnations of Godzilla exhibit a correlation to real world crises of the time. Beginning with the nuclear devastation of Hiroshima and Nagasaki; through to the more recent nuclear power plant catastrophes at Chernobyl and Fukushima; and including the Haiti Earthquake and the Indian Ocean Tsunami (Anisfield, 1995; Shapiro, 2013; Hioe, 2016; Schneiderwind, 2020).
Many of the films in the Godzilla franchise project and illuminate the causes and the consequences of mankind's inconsiderate actions. Whenever humanity interferes with the natural equilibrium Godzilla is often represented as a force of nature or an eco-warrior, attempting to restore the balance (Bernardi, 2006; Murray and Heumann, 2016; Kalat, 2017).
This paper has attempted to illustrate the wide range of ways the audience is able to empathise with Godzilla through the various phases and eras of the Godzilla franchise. Audiences should empathise with Godzilla, since the monster is often an accidental victim. No creature deserves to live in constant pain, Godzilla is an ultimate survivor (Gerow, 2006; Nakano, 2008). As this paper has repeatedly demonstrated, many times Godzilla just wants to be left alone. The monster defeats every foe and then goes home (Durkin, 2021).
Throughout the franchise, Godzilla is motivated by a wide range of emotions. Initially, destructive rampages are often fueled by hate, rage, and revenge. But many of the films show a softer, more compassionate side to the monster. Human emotions are repeatedly projected onto Godzilla in an anthropomorphic manner. The creature expresses happiness, sadness, and love. In multiple film eras the audience have watched as Godzilla cares for his child, helps other human characters, tries to defend the environment, and saves the planet (Nakano, 2008)
The Godzilla films have the capacity to teach the audience many important lessons about making the world a better place. It should be impossible for an audience to feel empathy for a giant radioactive dinosaur. However, we find a way, and we learn how to love a monster.
REFERENCES
Anisfield, N. (1995). Godzilla/Gojiro: Evolution of the Nuclear Metaphor, Journal of Popular Culture, 29(3), 53-62.
Anno, H. and Higuchi, S. (Directors). (2016). Shin Godzilla [Film]. Cine Bazar; Khara Corporation; Toho Company.
Anzai, S. (2021). Media Representation of an Imagined Imperial Community: Digital Media Reports in Japan at the Dawn of the Reiwa Era and Emperor Naruhito's Ascension to the Throne. Contemporary Japan, 1-32.
Banno, Y. and Honda, I. (Directors). (1971). Godzilla vs. Hedorah [Film]. Toho Company.
Barton, C. and Lantz, W. (Directors). (1948). Abbott and Costello Meet Frankenstein [Film].Universal International Pictures.
Benzon, W. L. (2007). Godzilla's Children: Murakami Takes Manhattan. Mechademia, 2(1), 283-287.
Bernardi, J. (2006). Teaching Godzilla: Classroom Encounters with a Cultural Icon. In In Godzilla's Footsteps (pp. 111-125). Palgrave Macmillan, New York.
Brophy, P. (2000). Monster Island: Godzilla and Japanese Sci-Fi/Horror/Fantasy. Postcolonial Studies: Culture, Politics, Economy, 3(1), 39-42.
Carroll, N. (1999). Horror and Humor. The Journal of Aesthetics and Art Criticism, 57(2), 145-160.
Crowder, R. J., Chhem, R. K., and Aziz, A. Z. (2016). Godzilla mon amour: The origins and legacy of nuclear fear in Japan. In Mental Health and Social Issues Following a Nuclear Accident (pp. 3-14). Springer, Tokyo.
Devlin, D., Emmerich, R., Raynis, R. and Kline, J. (Executive Producers). (1998–2000). Godzilla: The Series [TV series]. Global Entertainment Productions; Adelaid Productions; Centropolis Film Productions; Toho Company.
Dougherty, M. (Director). (2019). Godzilla: King of the Monsters [Film]. Warner Bros; Legendary Pictures; Toho Company.
Durkin, D. J. (2021). Godzilla and the Cold War: Japanese Memory, Fear, and Anxiety in Toho Studio's Godzilla Franchise, 1954-2016, (Doctoral Dissertation, Bowling Green State University).
Edwards, G. (Director). (2014). Godzilla [Film]. Warner Bros; Legendary Pictures; Disruption Entertainment.
Emmerich, R. (Director). (1998). Godzilla [Film]. Centropolis Film Productions; Fried Films;
Independent Pictures.
Fifield, A. (2016). The New Godzilla Film Imagines a Strong Japan Pushing Back Against the U.S. The Washington Post. (23 September 2016).
Fukuda, J. (Director). (1967). Son of Godzilla [Film]. Toho Company.
.
Galbraith, S. (2008). The Toho Studios Story: A History and Complete Filmography Scarecrow Press.
Gerow, A. (2006). Wrestling with Godzilla: Intertextuality, Childish Spectatorship, and the National Body. In In Godzilla's Footsteps. (pp. 63-81). Palgrave Macmillan, New York.
Głownia, D. (2013). Socio-Political aspects of Kaijū Eiga Genre: A Case Study of the Original Godzilla. Silva Laponicarum, 37, 66-94.
Greene, B. (2021). A Modern Monster. Japanese Horror: New Critical Approaches to History, Narratives, and Aesthetics, 21.
Guthrie-Shimizu, S. (2006). Lost in Translation and Morphed in Transit: Godzilla in Cold War America, in In Godzilla's Footsteps (pp. 51-62). Palgrave Macmillan, New York.
Hallenbeck, B. G. (2009). Comedy-Horror Films: A Chronological History, 1914-2008. McFarland.
Hashimoto, K. (Director). (1984). The Return of Godzilla [Film]. Toho Eizo Co.
Hioe, B. (2016). Shin Godzilla: Specters of Fukushima, Hiroshima, and Article 9. New Bloom (21 September 2016).
Honda, I. (Director). (1954). Gojira [Film]. Toho Film (Eiga) Co. Ltd.
Honda, I. (Director). (1956a). Rodan [Film]. Toho Film (Eiga) Co. Ltd.
Honda, I. (Director). (1956b). King Kong Escapes [Film]. Toho Company; Rankin/Bass Productions.
Honda, I. (Director). (1958). Frankenstein vs Baragon [Film]. Toho Company; Henry G. Saperstein Enterprises Inc.
Honda, I. (Director). (1966). War of the Gargantuas [Film]. Toho Company; UAP.
Honda, I. (Director). (1975). Terror of Mechagodzilla [Film]. Toho Company.
Honda, I. and Fukuda, J. (Directors). (1958). Destroy All Monsters [Film]. Toho Company.
Honda, I. and Fukuda, J. (Directors). (1969). Godzilla's Revenge (aka All Monsters Attack) [Film]. Toho Company; UPA.
Honda, I. and Matsubayashi, S. (Directors). (1963). Atragon [Film]. Toho Company.
Honda, I. and Montgomery, T. (Directors). (1963). King Kong vs. Godzilla [Film]. Toho Company; RKO General Pictures.
Honda, I. and Morse, T. (Directors). (1956). Godzilla: King of the Monsters! [Film]. Toho Company; Jewell Enterprises Inc.
Honda, I. and Oda, M. (Director). (1958). Varan [Film]. Toho Company.
Jones, J. (2015). Japan Removed: Godzilla Adaptations and Erasure of the Politics of Nuclear Experience. The Atomic Bomb in Japanese Cinema: Critical Essays, 34-55.
Kalat, D. (2017). A Critical History and Filmography of Toho's Godzilla Series. McFarland.
Kitamura, R. (Director). (2004). Godzilla Final Wars [Film]. Toho Company; CP international.
Koenig-Woodyard, C., Nanayakkara, S and Khatri, Y. (2018). Introduction: Monster Studies. University of Toronto Quarterly, 87(24).
Kosaka, M. (1990). The Shōwa Era (1926-1989).Daedalus, 27-47.
Lofgren, E. R. (2020). Godzilla and Rodin's The Gates of Hell. East Asian Journal of Popular Culture, 7(2), 271-287.
Looch, C. (2019). Godzilla: King of the Monsters and a Japanese Phenomenon. Culture Trip (24 May 2019).
Low, M. (1993). The Birth of Godzilla: Nuclear Fear and the Ideology of Japan as Victim. Japanese Studies, 13(2), 48-58.
Maletich, S. (2011). Godzilla and the Changing Contract Between Science and Society, (Honors Thesis, Regis University).
Morehead, J. (2019. Netflix's Godzilla Anime Trilogy is an Interesting, Disappointing Extension of the Kaijū Mythos. Opuszine (14 January 2019).
Moser, K. and Zelaya, K. (Eds.). (2020). The Metaphor of the Monster: Interdisciplinary Approaches to Understanding the Monstrous. Bloomsbury Publishing USA.
Murray, R. L. and Heumann, J. K. (2016). Monstrous Nature: Environment and Horror on the Big Screen. U of Nebraska Press.
Nakano, H. (2008). Signs Taken for Monsters: What Made Godzilla So Angry Then? Yokohama Journal of Social Sciences, 13(2): 1-7.
Noriega, C. (1987). Godzilla and the Japanese Nightmare: When "Them!" Is US. Cinema Journal, 63-77.
Ohmori, K. (Director). (1989). Godzilla vs Biollante [Film]. Toho Company; Toho Eizo Co; Toho Pictures.
Ohmori, K. (Director). (1991). Godzilla vs King Ghidorah [Film]. Toho Company.
Okawara, T. (Director). (1992). Godzilla vs Mothra [Film]. Toho Company.
Okawara, T. (Director). (1993). Godzilla vs Mechagodzilla II [Film]. Toho Company; Toho Eizo Company.
Okawara, T. (Director). (1995). Godzilla vs Destoroyah [Film]. Toho Company.
Okawara, T. (Director). (1999). Godzilla 2000: Millennium [Film]. Toho Pictures.
Okuno, E. (2016). Frankenstein's Mammoth: Anticipating the Global Legal Framework for De-Extinction. Ecology LQ, 43, 581.
Paul, W. (1994). Laughing Screaming: Modern Hollywood Horror and Comedy. Columbia University Press.
Peacock, T. N. (2021, July). From Crossroads to Godzilla: The Cinematic Legacies of the First Postwar Nuclear Tests. In Conversation (p. 22). The Conversation.
Pelea, C. I. (2020). Exploring the Iconicity of Godzilla in Popular Culture. A Comparative Intercultural Perspective. Проблеми на постмодерността, 10(1), 18-40.
Ragone, A. (2007). Defending the Earth with Ultraman, Godzilla in the Golden Age of Japanese Science Fiction Film. Chronicle Books.
Ryfle, S. and Godziszewski, E. (2017). Ishiro Honda: A Life in Film, from Godzilla to Kurosawa. Wesleyan University Press.
Schilling, M. (2016). Our Favorite Monster returns to Terrorize Japan in 'Shin Godzilla'. The Japan Times (28 July 2016).
Schneiderwind, J. (2020). Godzilla as the Bridge: The Destruction of Hiroshima, Nagasaki, and Fukushima. Arcadia, (June 2020).
Seshita, H. and Shizuno, K. (Directors). (2017). Godzilla: Planet of the Monsters [Film]. Polygon Pictures; Toho Animation.
Seshita, H. and Shizuno, K. (Directors). (2018a). Godzilla: City on the Edge of Battle [Film]. Polygon Pictures; Toho Animation.
Seshita, H. and Shizuno, K. (Directors). (2018b). Godzilla: The Planet Eater [Film]. Polygon Pictures; Toho Animation.
.
Shapiro, J. F. (2013). Atomic Bomb Cinema: The Apocalyptic Imagination on Film Routledge.
Smith, B. R. (2002). Green Scales and Hot Breath: Godzilla! Again! Journal of Evolutionary Psychology, 11-19.
Soles, C. (2021). Godzilla as Camp De-Extinction Narrative. Science Fiction Film and Television, 14(3), 297-314.
Spielberg, S. (Director). (1998). Jurassic Park [Film]. Universal Pictures; Amblin Entertainment.
Srivatsan, S. and Venkatesh, M. (2021). Godzilla: Examined as More than a Monster Movie. Pioneer: Journal of Language and Literature, 13(1), 41-51.
Tanaka, Y. (2005). Godzilla and the Bravo Shot: Who Created and Killed the Monster? Japan Focus, June 10 th 2005.
Tezuka, M. (Director). (2002). Godzilla vs Mechgodzilla [Film]. Toho Company.
Tezuka, M. (Director). (2003). Godzilla: Tokyo S.O.S. [Film]. Toho Company.
Tsutsui, W. M. (2004). Godzilla on my Mind: Fifty Years of the King of Monsters. Macmillan.
Tsutsui, W. M. (2016). Review: Shin Godzilla. Arkansas Online. (7 October 2016).
Viragh, A. (2013). Can the Vampire Speak?: Dracula as Discourse on Cultural Extinction. English Literature in Transition, 1880-1920, 56(2), 231-245.
Vogt-Roberts, J. (Director). (2017). Kong: Skull Island [Film]. Warner Bros; Legendary Pictures; Tencent Pictures.
West, M. I. (2008). The Japanification of Children's Popular Culture: From Godzilla to Miyazaki. Scarecrow Press.
Whitfield, S. J. (1996). The Culture of the Cold War. JHU Press.
Wingard, A. (Director). (2014). Godzilla vs Kong [Film]. Legendary Entertainment; Warner Bros.
Yamashita, K. (Director). (1994). Godzilla vs Spacegodzilla [Film]. Toho Company.
|
<urn:uuid:d83429bf-10c0-4e6f-a932-07995a810e13>
|
CC-MAIN-2022-05
|
https://55fe5255-a4d9-45fa-8d5c-c7dcac88eadf.filesusr.com/ugd/0d1f4b_925ac2b67f3c4d3581adcd5cc6c45edc.pdf
|
2022-01-18T09:30:35+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-05/subset=warc/part-00281-1e2959d8-5649-433a-b76e-f1b876a6479d.c000.gz.parquet
| 146,651,404
| 12,974
|
eng_Latn
|
eng_Latn
| 0.837069
|
eng_Latn
| 0.997179
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2938,
6153,
9786,
12652,
16759,
19950,
22803,
26471,
29564,
32887,
36513,
39483,
42546,
45544,
47660,
49613,
51680,
53726,
55271
] |
Lighting
Lighting
Dynalite Relay Controllers
DRC-GRMS-UL
Purpose-built room automation and energy management system. This dedicated controller is completely self-contained and requires no external power supply, relays or processor.
Purpose-built room automation and energy management system. This dedicated controller is completely self-contained and requires no external power supply, relays or processor.
Dados do produto
Dynalite Relay Controllers
Desenho dimensional
Dynalite Relay Controllers
Dynalite Relay Controllers
© 2021 Signify Holding Todos os direitos reservados. A Signify não fornece quaisquer representações ou garantia relativamente à exatidão ou integridade das informações aqui incluídas e não será responsável por qualquer ação com base nas mesmas. As informações apresentadas neste documento não se destinam a qualquer oferta comercial e não constituem parte de qualquer proposta ou contrato, salvo acordo em contrário com a Signify. Todas as marcas comerciais registadas são propriedade da Signify Holding ou dos respetivos proprietários.
www.lighting.philips.com
2021, Junho 3 - Dados sujeitos a alteração
|
<urn:uuid:a7c3175f-ebbb-4237-be5d-71d320e6c078>
|
CC-MAIN-2021-39
|
https://www.lighting.philips.pt/api/assets/v1/file/PhilipsLighting/content/fp913703331109-pss-pt_pt/913703331109_EU.pt_PT.PROF.FP.pdf
|
2021-09-27T19:20:44+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-39/subset=warc/part-00020-f465d820-0362-4c4c-a396-c69f5fd24cc4.c000.gz.parquet
| 862,819,025
| 251
|
eng_Latn
|
por_Latn
| 0.498899
|
por_Latn
| 0.992852
|
[
"eng_Latn",
"por_Latn"
] | false
|
rolmOCR
|
[
428,
1141
] |
Modernising the Research and Development Corporation system
University of Melbourne Submission
November 2019
Overview
The University of Melbourne welcomes the opportunity to provide comment on the Australian Government's Discussion Paper, Modernising the Research and Development Corporation system.
Rural Development Corporations (RDCs) are an important part of the Agriculture Innovation System and make valuable contributions to industry research and knowledge of international markets. RDCs are also a valuable mechanism through which new developments can be communicated to producers. The University has had a number of successful partnerships with individual RDCs over the years and continues to work closely with them on a range of research projects.
The RDC system has a good track record and the University welcomes the opportunity to continue partnering with RDCs on research. However it is timely to review the RDC system and structure to ensure RDCs are equipped to address the challenges faced by the agricultural sector such as impacts from climate change, drought and changing consumer expectations for food and fibre products.
The Government's Discussion Paper outlines the attributes that a modern RDC system needs to have in order to respond to the challenges facing the sector 1 including: being responsive to change; turning research into tangible benefits for producers; and providing a strong voice for industry. An additional focus to include is research that focuses on cross-sectoral and long-term priorities that will help ensure the productivity and sustainability of Australia's food and agriculture sector.
Additionally, the RDC system needs to be able to better articulate the public value it is delivering and benefits it provides not only for the agriculture sector, but for innovation and the economy more broadly. Enhancing public perception and consumer awareness of the benefits delivered by RDCs will provide a stronger social licence 2 to operate and also increase its attractiveness as a partner for investment and collaboration.
In developing this submission, the University brought together views of researchers from the Faculty of Veterinary and Agricultural Science, Faculty of Science and Melbourne School of Engineering with experience of working with RDCs – including as research partners, collaborators and some with experience as board members or advisers.
Our response to the Discussion Paper focuses on two key areas:
* A focus on research including the need for long-term, cross-sectoral research, more local research and some suggestions for changes to the way that RDCs partner on research.
* Uptake of Research and Development including a discussion on the fragmented nature of Australia's current agricultural extension system and a potential role for RDCs in providing leadership and building capacity of extension practitioners.
We would welcome the opportunity to discuss these issues further with the advisory panel or otherwise assist in developing recommendations.
For more information or to discuss the submission, Professor John Fazakerley, Dean, Faculty of Veterinary and Agricultural Sciences can be contacted at [email protected].
1 Modernising Australia's Research and Development Corporations, Discussion Paper, p5
2 Council of Rural RDCs, Vision 2050 - New thinking about rural innovation in Australia, p10, available from: http://www.ruralrdc.com.au/wp-content/uploads/2018/12/Vision-2050-Paper-December-2018.pdf
A focus on research
The need for long-term, cross-sectoral research
A key focus for a modern RDC system should be to facilitate and invest in research that focuses on cross-sectoral and long-term priorities that will help ensure the productivity and sustainability of Australia's food and agriculture sector. The emergence of 'wicked' problems facing the sector, such as climate change, environmental degradation, species extinctions, soil management, sustainable intensification, and drought policy, signals a need for investment in collaborative and long-term research that may help guide possible solutions to some of these challenges.
A future RDC system should facilitate the development of larger collaborative consortia around key thematic areas, for example, water, climate change, soil carbon and nitrogen, animal welfare or more targeted interventions such as smart, more specific, fertilisers, herbicides, pesticides and disease prevention technologies; these consortia would be aimed at long-term productivity and sustainability and should not be awarded or appraised against short term gains. They could bring together multiple investors, including various RDCs in partnership, and multiple research providers, including universities, with a long-term funding commitment from all partners. Models such as Cooperative Research Centres, the Genetics Consortium and the Livestock Productivity Partnership could be looked to as potential future models for RDCs. Reinstating or drawing lessons from the Rural Research & Development for Profit program 3 would also be worthwhile. This program enabled cross-sectoral effort and identified areas that might work well for collaboration. The last stage of the program was oversubscribed, indicating an interest and demand from RDCs for this mechanism.
RDC approach to partnering on research
The review of the RDC system needs to consider a fundamental change in how the system approaches research. RDCs are important players in the broader agricultural innovation system. There are multiple benefits from funding rural research, not only for improving productivity, but also the resulting broader public benefits such as healthier foods, increased biodiversity, reducing emissions and improved water management. Multiple benefits means that funding sources can and should be broad and cover philanthropic interests and ethical investment funds. A future RDC system needs to be well-positioned to take advantage of growing investment and interest in agricultural innovation from the private sector and other organisations.
In partnering with RDCs on research projects over many years, some of the University's researchers have observed that the RDCs tend to approach research as though it is a purchase and provider model, taking a 'one size fits all' approach to universities and research projects. This type of 'procurement' approach is not necessarily appropriate or fit for purpose. Changes are needed to ensure that RDCs engage with and resource strategic research and collaborations. Some suggested mechanisms that might help achieve this change follow.
* A cross-sectoral approach to call for research. Individual RDCs use different processes for contracting organisations for research projects. For example, some adopt an annual cycle of
3 See: Department of Agriculture, Rural Research and Development for Profit, https://www.agriculture.gov.au/ag-farmfood/innovation/rural-research-development-for-profit Accessed 19 November 2019.
funding, some have tendering and others have open-ended cycles. These inconsistences in timing and processes can limit or hamper efforts to develop strategic or cross-sectoral research. For cross-sectoral projects it is often left to the researcher to bring together interest from multiple RDCs. Working with different timing and processes between RDCs can result in additional and unnecessary transaction costs. RDCs should be taking the lead on facilitating these connections and bringing together collaborations on identified issues. An example of this working well internationally is the European Union's Horizon 2020, which has a set agenda and identified long-term work programs for research and innovation. 4 RDCs should consider cross-sectoral strategic calls for research as a way to address a range of issues.
* Co-innovation models are needed, which must be fit for business and based on an understanding of the contexts in which collaborators are operating. A linear model of research investment is no longer fit for purpose for the scale of challenges that need to be addressed. Trials of co-innovation approaches in Australia, NZ and Europe have found that organisations such as RDCs and governments have "a potentially pivotal role in supporting co-innovation with private extension providers and supply-chain companies." RDCs and government have a broader role to play as innovation brokers.
* Upskilling RDC staff to better enable investment decision making is needed. A focus on culture in investment decision making, and on upskilling staff making those decisions will also be important in enabling future collaboration and attracting new participants. Staff need to act as investment managers or brokers, on par with private investors and philanthropic organisations, so that they are better able to bring together partners, network across sectors, find common goals and leverage opportunities. Much of this currently falls to researchers and research organisations, which may not be as well-placed as RDCs to fulfill this function.
* A trend in researchers being able to participate more broadly in RDC activities such as workshops and reference groups should be welcomed. This enables researchers to get to know relevant program managers and facilitates a better understanding of RDC priorities. This in turn can open opportunities to negotiate research concepts at an earlier stage, before proceeding to full proposals for funding. The review of RDCs should recognise this trend and consider if this is a more efficient approach for all parties.
* Increasing the length of research contracts. There needs to be a better balance between funding for shorter and longer term work. RDC contracts have been dominated by a threeyear funding model, however, challenging issues such as climate change, environmental degradation and sustainable intensification cannot be adequately addressed in three-year funding cycles. This highlights the need for patient, longer-term investment in interdisciplinary research aimed at tackling such issues. These shorter funding cycles are not only eroding existing research capacity, but also limit the ability of institutions to secure future
4 See: Horizon 202, European Union. Available at: https://ec.europa.eu/programmes/horizon2020/en/what-horizon-2020. Accessed 19 November 2019.
research talent through lack of security of tenure. Lack of certainty regarding funding also impacts investment in research infrastructure.
* A more robust process is needed for terminating longer term projects. Much effort now goes into the identification, planning and negotiations of a major project. However, the eventual decision-making around ceasing a long-term investment does not have the same level of scrutiny, rigour and throughtfulness. In addition, some researchers also emphasise the need to move away from milestone driven progress reports, given that these do not always reflect the uncertainty and unpredictability often inherent in research. More flexibility around milestones and outputs would be beneficial.
Locally focused research
There is also a need for regionally-based research that can address local issues and provide opportunities for innovation. Some regions might have particular challenges, for example, onset of diseases or water table changes, others might present particular opportunities either because of changed agricultural practices or because of prior investment in research facilities. Our impression from local stakeholders, in rural communities in which the University is engaged, is that industry and the RDCs are not investing in the regionally relevant research needed. This in part may be due to previous decisions by government to create national frameworks for Research, Development and Extension which centralised research functions in states and sectors. 5
Currently other organisations are endeavouring to fill this gap. For example, the University of Melbourne has partnered with Latrobe University to establish the Mallee Regional Innovation Centre in Mildura. The Centre provides a network through which the Mallee region can draw on the expertise and resources available at the two universities and is working to identify, develop and progress research priorities to address key challenges in the Victorian Mallee region relating to agriculture. There may be opportunities for RDCs to partner with universities and research organisations to invest in locally relevant research.
Recommendations
The University of Melbourne recommends:
* The RDC system should have a central focus on facilitating and investing in cross-sectoral strategic research.
* RDCs need to be well-positioned to take advantage of opportunities to partner with other investors in funding research, adopting an innovation broker role.
* Consideration be given to changing the way RDCs partner on research such as offering crosssectoral open calls, implementing long-term contracts and facilitating opportunities for researchers and RDCs to work closely together before developing funding proposals.
* For some strategic programs, rewarding and appraising of RDC investments should not focus on short term gains but long-term gains and sustainability.
5 See: National Primary Industries Research, Development and Extension Framework 2009. Available from: www.agriculture.gov.au/agfarm-food/innovation/national-primary-industries/statement_of_intent#part-ii-national-primary-industries-rde-framework . Accessed 19 November 2019.
* Consideration be given to reinstating the Rural Research and Development for Profit program or similar system to fund cross-sectoral research.
* Consideration be given to opportunities to partner with universities to deliver locally relevant research.
Uptake of agricultural R&D
The discussion paper references 'extension' and 'adoption' as discrete activities that RDCs can facilitate. An alternative approach is to consider how RDCs can help bring together producers, researchers and intermediaries, such as farm advisers and farmer groups, to engage in the innovation system more directly.
The premise of the questions in the discussion paper section 4.3 concerning 'uptake of R&D' are contrary to the desired strong system of innovation in agriculture reflected in the earlier sections of the discussion paper. The idea of 'an extension service' 6 is outdated to the extent that farmers use a range of sources of information, advice and support and there is no longer one organisation responsible for extension (see figure 1, page 8 of this document). Rather, uptake of R&D relies on engagement with this knowledge ecosystem.
Research into the status of Australia's agricultural advisory and extension system conducted for the government and RDCs 7 showed that there is no one extension provider nor a coordinated extension system operating in Australia. Each sector and each state has their own approach and resources to draw on to coordinate and conduct extension - by international standards, the extension system is fragmented. Strong coordination and incentives for advisers and extension providers from the public and private sector are required to ensure they are connected to research, involved in development efforts and involved in the design and delivery of support to enhance the application and use of research. In this context, there are a number of ways in which the RDC system has the potential to better support and facilitate agricultural extension. Some key areas follow:
* RDCs and government have an important role in governing innovation and research and development pathways. Research results on their own are not adoptable but instead need to be considered in light of the change or benefit sought in a farming population or in farm management. Research results may have a commercial product or service pathway, or need to be trialed in different contexts and with different farming populations to be considered worthwhile for promotion or extension. They may also have a use in policy or in investment decisions. The use of the research in supporting the change desired can be considered by development and extension and adoption teams coordinated by RDCs. Given there is no one organisation or funding mechanism with responsibility for translation of research, strong leadership and governance around the extension and advisory system is required, rather than a laissez-faire or market led approach. In most other countries, governments play a key role in the setting of agricultural advisory and extension system policies and take a leadership role in the coordination and governance of the advisory and
6 Discussion Paper, p10
7 Stimulating private sector extension in Australian agriculture to increase returns from R&D, collaborative project funded by partners and the Rural Research and Development for Profit Program. See: http://rirg.fvas.unimelb.edu.au/ag-extension
extension system. Consideration should be given to whether the RDC system can support this function.
* Building capacity of extension practitioners across the innovation system. The fragmentation of Australia's agricultural extension system has also limited the development of the capacity of practitioners conducting extension across all sectors. Improved capability of extension service providers, both private and public, will contribute to on-farm productivity gains and profitability. There is a role for government, via the RDCs, to focus on capacity building for practitioners from across the innovation system, not just in RDC staff. The University of Melbourne has sought to address this issue for the Australian context by offering a specialisation in agricultural extension and innovation within the Masters of Agricultural Sciences. 8 The RDC system may consider how it could partner with universities to help build practitioner and RDC staff capacity in agricultural extension.
8 See Masters Specialisation 'Agricultural Extension and Innovation': https://handbook.unimelb.edu.au/components/mc-agsc-spec-5
Source Nettle et al., 2018: Australian farmers sources of information, advice and support (all used and main source) n=1003
In a national survey, farmers were asked to identify the organisation types to which they drew from for information, advice and support in their farm management. They were then asked to identify a 'main source.' On average, farmers used four sources of information, advice and support with 85 per cent of farmers identifying their farm input suppliers as a source. Independent fee-for-service advisers such as farm management consultants were noted as a main source by 32 per cent of farmers. Different agricultural industry sectors had different profiles for their main sources. Further, farmers credited their engagement with their 'main source' as influencing changes in their farm operations. Private, industry, not for profit and public sector organisations were all used by farmers in practice change.
An overall increase in demand for information, advice and support from farmers' main source over the next five years was reported by 32 per cent of farmers, signalling the need for greater focus on extension coordination, graduate pathways into advisory and extension roles and professional development.
Recommendations
The University of Melbourne recommends:
* Consideration be given to the role of RDCs in supporting a cohesive advisory and extension system and involving and engaging providers with direct influence at farm level in research and translation efforts.
* Consideration be given to an effective advisory and extension system as needing cross sectoral effort.
* Consideration be given to supporting research related to the advisory and extension system to track issues, challenges and improvements .
* Consideration be given to recommendations from the Stimulating private sector extension in Australian agriculture to increase returns from R&D 9 report in future investment.
9 See: Stimulating private sector extension in Australian agriculture to increase returns from R&D, Final Report https://rirg.fvas.unimelb.edu.au/__data/assets/pdf_file/0009/2860848/Project-Key-Findings.pdf
Summary of recommendations
A focus on research
A focus on research ought to be central to a modern RDC system, and should include support for long-term cross-sectoral research and flexibility in models for RDC research partnerships.
The University of Melbourne recommends:
* The RDC system should have a central focus on facilitating and investing in cross-sectoral strategic research.
* RDCs need to be well-positioned to take advantage of opportunities to partner with other investors in funding research, adopting an innovation broker role.
* Consideration be given changing the way RDCs partner on research such as offering crosssectoral open calls, implementing long term contracts and facilitating opportunities for researchers and RDCs to work closely before developing funding proposals.
* For some strategic programs, rewarding and appraising of RDC investments should not focus on short term gains but long-term gains and sustainability.
* Consideration be given to reinstating the Rural Research and Development for Profit program or similar system to fund cross-sectoral research.
* Consideration be given to opportunities to partner with universities to deliver locally relevant research.
Uptake of R&D
RDCs can help bring together producers, researchers and intermediaries, such as farm advisers and farmer groups, to engage in the innovation system more directly, which may better support and facilitate agricultural extension.
The University of Melbourne recommends:
* Consideration be given to the role of RDCs in supporting a cohesive advisory and extension system and involving and engaging providers with direct influence at farm level in research and translation efforts.
* Consideration be given to an effective advisory and extension system as needing cross sectoral effort.
* Consideration be given to supporting research related to the advisory and extension system to track issues, challenges and improvements .
* Consideration be given to recommendations from the Stimulating private sector extension in Australian agriculture to increase returns from R&D report in future investment.
Contributors to this submission
Professor Robin Batterham, Melbourne School of Engineering
Professor Iain Clarke, Faculty of Veterinary and Agricultural Sciences
Professor Richard Eckard, Faculty of Veterinary and Agricultural Sciences
Professor John Fazakerley, Dean, Faculty of Veterinary and Agricultural Sciences
Associate Professor Gregory Harper, Faculty of Veterinary and Agricultural Sciences
Professor Ary Hoffman, Faculty of Science
Professor Ruth Nettle, Faculty of Veterinary and Agricultural Sciences
Professor Timothy Reeves, Faculty of Veterinary and Agricultural Sciences
References
Ayre, M., Mc Collum, V., Waters, W., Samson, P., Curro, A., Nettle, R., Paschen, J.A., King, B. and Reichelt, N., 2019. Supporting and practising digital innovation with advisers in smart farming. NJASWageningen Journal of Life Sciences. https://doi.org/10.1016/j.njas.2019.05.001
Council of Rural RDCs, Vision 2050 - New thinking about rural innovation in Australia, available from: http://www.ruralrdc.com.au/wp-content/uploads/2018/12/Vision-2050-Paper-December-2018.pdf
Nettle R., Ayre M., King B., La N., Paschen J-A., Reichelt N., Smith E., The advisory and extension system in Australia: Opportunities for strength in pluralism. 13th European International Farming Systems Association Symposium 2018, Mediterranean Agronomic Institute of Chania, Greece, 1-5 July
Nettle, R., La, N., Smith, E., 2018., Research Report A: Farmer demand for agricultural extension services. Prepared for: 'Stimulating private sector extension in Australian agriculture to increase returns from R&D'. (May, 2018). A project of the Department of Agriculture and Water Resources (DAWR) Rural R&D for profit program, University of Melbourne, Melbourne, Australia
Nettle, R., La, N., Smith, E., 2018., Research Report B: Supply of farm advisory and extension services. Prepared for: Stimulating private sector extension in Australian agriculture to increase returns from R&D. (May, 2018). A project of the Department of Agriculture and Water Resources (DAWR) Rural R&D for profit program, University of Melbourne, Melbourne, Australia
Nettle, R., La, N., Smith, E., 2018., Research Report C: the advisory and extension system. Prepared for: 'Stimulating private sector extension in Australian agriculture to increase returns from R&D'. (June, 2018). A project of the Department of Agriculture and Water Resources (DAWR) Rural R&D for profit program, University of Melbourne, Melbourne, Australia
Paschen, J-A, Reichelt, N, King, B, Ayre, M & Nettle, R (2017), 'Enrolling Advisors in Governing Privatised Agricultural Extension in Australia: Challenges and Opportunities for the Research, Development and Extension System', Journal of Agricultural Education and Extension23(3):265-82
|
<urn:uuid:b2ac49f3-dd3c-48e6-8caf-615253ea7da1>
|
CC-MAIN-2022-49
|
https://about.unimelb.edu.au/__data/assets/pdf_file/0028/120997/UoM_submission_Modernising_Australias_Research_and_Development_Corporations.pdf
|
2022-12-05T04:10:48+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-49/subset=warc/part-00132-a0906200-461b-4808-9b94-6c53daf73f61.c000.gz.parquet
| 112,057,083
| 4,717
|
eng_Latn
|
eng_Latn
| 0.92973
|
eng_Latn
| 0.994615
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
110,
3512,
7019,
10363,
13527,
16950,
18072,
19583,
20213,
22334,
25120
] |
LITURGY OF THE WORD 20th Sunday in Ordinary Time
First Reading I s 56:1.6-7
A reading from the prophet Isaiah
Thus says the Lord: Have a care for justice, act with integrity, for soon my salvation will come and my integrity be manifest. Foreigners who have attached themselves to the Lord to serve him and to love his name and be his servants – all who observe the sabbath, not profaning it, and cling to my covenant – these I will bring to my holy mountain. I will make them joyful in my house of prayer. Their holocausts and their sacrifices will be accepted on my altar, for my house will be called a house of prayer for all the peoples.
Responsorial Psalm Ps 66:2-3 5-6. 8. R. v.4
(R.) O God, let all the nations praise you!
1. O God, be gracious and bless us and let your face shed its light upon us. So will your ways be known upon earth and all nations learn your saving help.
2. Let the nations be glad and exult
for you rule the world with justice.
you guide the nations on earth.
With fairness you rule the peoples,
3. Let the peoples praise you, O God;
May God still give us his blessing let all the peoples praise you.
till the ends of the earth revere him.
(R.) O God, let all the nations praise you!
Second Reading Rom 11:13-15. 29-32
A reading from the letter of St Paul to the Romans Let me tell you pagans this: I have been sent to the pagans as their apostle, and I am proud of being sent, but the purpose of it is to make my own people envious of you, and in this way save some of them. Since their rejection meant the reconciliation of the world, do you know what their admission will mean? Nothing less than a resurrection from the dead! God never takes back his gifts or revokes his choice. Just as you changed from being disobedient to God, and now enjoy mercy because of their disobedience, so those who are disobedient now – and only because of the mercy shown to you – will also enjoy mercy eventually. God has imprisoned all men in their own disobedience only to show mercy to all mankind.
Gospel Acclamation Mt 4:23
Alleluia, alleluia!
Jesus preached the Good News of the kingdom
and healed all who were sick.
Alleluia!
Gospel Mt 15:21-28
A reading from the holy Gospel according to Matthew Jesus left Gennesaret and withdrew to the region of Tyre and Sidon. Then out came a Canaanite woman from that district and started shouting, 'Sir, Son of David, take pity on me. My daughter is tormented by a devil.' But he answered her not a word. And his disciples went and pleaded with him. 'Give her what she wants,' they said 'because she is shouting after us.' He said in reply, 'I was sent only to the lost sheep of the House of Israel.' But the woman had come up and was kneeling at his feet. 'Lord,' she said 'help me.' He replied, 'It is not fair to take the children's food and throw it to the house-dogs.' She retorted, 'Ah yes, sir; but even house-dogs can eat the scraps that fall from their master's table.' Then Jesus answered her, 'Woman, you have great faith. Let your wish be granted.' And from that moment her daughter was well again.
© The scriptural quotations are taken from the Jerusalem Bible, published and copyright 1966, 1967 and 1968 by Darton Longman and Todd Ltd and Doubleday & Co Inc, and used by permission of the publishers. The English translation of the Psalm Responses, the Alleluia and Gospel Verses, and the Lenten Gospel Acclamations, and the Titles, Summaries, and Conclusion of the Readings, from the Lectionary for Mass © 1997, 1981, 1968, International Committee on English in the Liturgy, Inc. All rights reserved.
============================================
FOOD FOR THOUGHT.
Why do you think Jesus first responded to the woman in the way he did?
What turned Jesus' attitude around?
What do you think the woman was thinking/feeling as she approached Jesus?
What message would the followers of Jesus have taken from this event?
What is the message of this Gospel passage for us today?
Historical Context ... Who were the Canaanites?
When Moses led the Israelites out of Egypt, the 'Promised Land' they sought was the land of Canaan (approximately the area of modern Israel, TransJordan, Syria and Lebanon). Here they were commanded to utterly destroy the Canaanites and to subdue the land. (Exodus 23:23-24) The Israelites never successfully removed all the Canaanites from the Palestine region. By the time of Jesus, the Israelites had established themselves in the region between Judea in the south and Galilee in the north, while the original inhabitants of the area had been 'squeezed out' – predominantly to the north. The Canaanites were dispossessed of their land by the Israelites and it is easy to see why there was tension between them.
St Mary's Parish Swan Hill Bulletin
Priest: Fr. Matthew Thomas PP
Parish Secretary: Glenda Klabbers
Parish Council Chair: Michelle Haeusler
Parish Safeguarding Officers:
Karen & Damien Kelly
St Mary's School Principal: Greg Lane
St Mary MacKillop Principal: Michelle Haeusler
Parish Office: Tuesday 10.00am - 2.00pm
Friday 10.00am -2.00pm
Mass Next Weekend:
Sunday
Saturday
6.30 pm Vigil Swan Hill 10.30 am Swan Hill
Mass this Week:
Tues:
No Mass Fr Matt in Melbourne
Wed: No Mass Fr Matt in Melbourne
Thursday: No Mass Fr Matt in Melbourne
Friday: 11am Exposition of the Blessed Sacrament 12.00 noon
Mass Intentions:
Sunday: Amedio Silverii, Marrietta Silverii, Alfredo Pichno, Friday: Frank Bonanno
DATES TO REMEMBER IN AUGUST
27th August: Lake Boga Mass 8.30am
21st August: Baptism Preparation. 7.00pm 22nd August: Distribution Meeting; Stewardship Program 10.00am
September
4th September CWL 1.30pm
12th September: Logan Lodge Prayer Service 2pm
13th September: Alcheringa 2pm
CWL Cake Stall
On Sunday 3rd September the CWL ladies will be holding a cake stall and raffle. CWL are also looking for new members, if number continue to decline then the branch will have to close at the end of the year.
Letter from Bishop Paul
the Diocese about the current situation with
Bishop Paul has written a letter to all the within the Child Sexual Abuse , a copy of the letter is
take a copy home.
in the foyer if you wish to
20th Sunday in Ordinary Time Year A 20th August 2017
Presbytery: 62 Splatt Street Swan Hill 3585
Phone: 03 50324144
Email: [email protected]
The Parish of Swan Hill comprises of the
faith Communities of:
St Marys Swan Hill,
St Joseph's Lake Boga
Recently Deceased: We commend to God
Anniversaries:
We remember:
Prayers for the Sick: Erin Coburn, Jude Lewis, Ronald Duryea, Brian Mulcahy, Brooke Kennedy, Jarrod Crimmins,
If you would like a sick person prayed for, please ask for their permission. After one month names will be deleted from the list unless otherwise advised.
Sea Lake Community
- What was their expectations of Me (Fr Matt)
I met with the people of the Sea Lake community and spoke to them about the partnering of the parishes. I asked them to consider and respond to later on the following:
- What are their concerns?
- What are some negatives?
- What are some positives?
This could be something that we too could think about.
ACYF 2017
Registrations for the Australian Catholic Youth Festival are already over 80% capacity and Early Bird Registrations close on 18 August. The Festival is 7-9 December 2017, for Year 9-30 yo. Ballarat Diocese Youth and Young Adult Ministry has secured accommodation in Sydney and bus transport there and back. Please contact Amanda soon to 'book in' your group. If you are not yet part of a group, we can help – contact [email protected] or 0427 748 8 6 7 . M o r e i n f o r m a t i o n on www.ballarat.catholic.org.au / Youth and Young Adult pages.
ST MARY'S MINISTRIES for 27th August 2017
Vigil: Eucharist Mass
10.30am: Eucharist Mass
Ministers of Communion:
Vigil: M Hoare, B McCartney, H Lewis, C Page
10.30 am: S Colombo, R Jager, M Foott, E Milazzo,
Y Richardson, J Renda
Presentation of Gifts:
Vigil: Eucharist Mass
10.30am : Eucharist Mass
Music Ministry:
Vigil: Eucharist Mass
10.30am: Eucharist Mass
Counters: P Livingston, A Dean
Ministers of the Word:
==============================================
Presbytery Account:
STATE OF THE NATION
(
(1st Basket)
$ 703.35
Parish Account:
(2nd Basket)
$ 946.00
Support of Priests & Bishop
)
(
Support of the Parish
)
$ 0.00
$ 113.70
Envelopes Credit Card Direct Debit Loose Plate
$ 0.00
$
Thank-You!
READINGS NEXT WEEK 27th August Year A
================================================
1st Reading : Is 22:19-23
2nd Reading: Rom: 11: 33-36
Gospel: Mt 16: 13-20
===============================================
From the perspective of ... A disciple.
As we passed through a little village near Sidon this Canaanite woman suddenly started calling on the master to help her daughter. We all expected the master to help her out as usual but he really put her in her place! He told her that his ministry was not for pagans like her. That should have stopped her, but she kept on and on, even turning the master's words back on him! She was so rude. We were about to push her out of the way so that the master could move on when he suddenly told her that her faith was great and that her daughter was better. Great faith? A Canaanite? He never ceases to surprise us!
Palms Australia Ballarat Informa on Sessions
Communi es in Asia, the Pacific and Africa are looking to provide mentoring opportuni es for local personnel and improve processes and procedures for organisaons vital to reducing poverty. To ensure sustainable development they prefer those willing to come for two years, but accept that some are only available for 12 months. If you are an experienced professional, business or trades person, in any area, but especially educa on, please consider volunteering with Palms Australia. An informa on session will be held on Thursday, September 14, 2017 from 5.30pm7.00pm at the Australian Catholic University, Building 100 Torney Room, 1200 Mair St, Ballarat. RSVP [email protected] or call 02 9560 5333. Can't make it? Call now about applying for posions currently available or look first via Palms' twoweek Encounter (palms.org.au/encounters/)
MGL Sisters Consecrated Life Weekend
Curious about Consecrated Life?? Wondering what God is calling you to in your life?? Seeking some space to listen to God?? The Missionaries of God's Love Sisters (MGL) would like to invite young women to their Consecrated Life Weekend from September 15-17. The weekend will include talks, opportunity for prayer, sharing, sisterhood and more. Friday night will begin at the Sisters house at 6pm, and the following days will be at St Benedict's Parish in Burwood. Cost is by donaon. For more informa on or to RSVP, call us on 03 9857 8177 or email [email protected]. We look forward to sharing the gi of our life with you.
Family Matters - Strengthening Respectful Relationships Forum
All are welcome to attend this Forum with Fr Frank Brennan SJ as the guest speaker which will be held in Ballarat on June 24, Warrnambool July 22, and Mildura August 26. These free events are being hosted by the Social Justice Commission of the Diocese of Ballarat together with many workshops provided by Centacare. Please register your attendance at one of the venues listed: h t t p ://2 0 1 7 f a mi l yma t t e r s .we e bl y.com/ Details about workshops will be released soon. Alternatively, contact Danielle Peters or Tony Haintz - [email protected].
|
<urn:uuid:1811dbf1-1611-4393-b4ec-95a5f28f6894>
|
CC-MAIN-2021-21
|
https://www.ballarat.catholic.org.au/wp-content/_uploads/rsfil/017008_abac.pdf
|
2021-05-18T23:43:11+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-21/subset=warc/part-00004-2bb1ba05-1421-4b90-a3f4-bbc46b4a29a5.c000.gz.parquet
| 683,856,552
| 2,908
|
eng_Latn
|
eng_Latn
| 0.993366
|
eng_Latn
| 0.995086
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
7785,
11621
] |
RHODES CUP SPORTING TRIAL - SATURDAY 14 TH SEPTEMBER 2024
To be held under the International sporting code of the F.I.A., the general competition rules of Motorsport Ireland including Appendix 88 of the current Yearbook and these Regulations.
CLERK OF THE COURSE: STEPHEN BODEN
CHILDRENS OFFICER: RUVÉ STEWART
EVENT SECRETARY: ROY STEWART
MI SAFETY DELEGATE: ENDA BYRNE
M.I. SCRUTINEER:
ENDA BYRNE (087 2682767)
STEWARDS:
Should the need arise, Stewards will be appointed in accordance with GCR 130.2.
START AT 11.00 AM. DRIVERS BRIEFING AT 10.45 AM.
Competitors are requested to arrive at least 45 minutes before start time (10.15am).
A penalty of ten marks may be imposed on Competitors who fail to enter the section in the draw sequence as per Appendix 88; 4.13. A time limit may apply on the day.
VENUE: AUGHFARRELL, BRITTAS, CO. DUBLIN BY KIND PERMISSION OF MICHAEL QUINN N 53° 13.898', W 6° 25.237'
DRIVERS; PASSENGERS; OTHER VEHICLES.
No competition car may be driven on any part of the course or adjoining lands by any person other than by a person who has entered for the event and who has signed the official entry form.
No competing car may carry more than two persons during the event or whilst the car is in any part of the course or adjoining lands. All such persons carried must be either an entered driver, an entered passenger or bouncer, or an official of the meeting. No other person is permitted in the car.
No non-competing vehicles (including motor bikes, bicycles, scooters) are allowed on any part of the course or adjoining lands without the permission of the Clerk of the Course.
VERBAL ABUSE of an OBSERVER or OTHER OFFICIAL may result in an additional penalty as per GCRs 139.7 and 142
COMPETITION LICENCES
All Competitors must hold a valid Competition Licence in accordance with Appendix 1 of the current MI Yearbook.
A Clubman National B Licence is available to Competitors over 16 years. A Junior Licence is available to
Competitors aged 10-16 years.
JUNIOR ENTRIES
Competitors aged 10 to 16 inclusive may enter for the event. Junior competitors must be accompanied in the car by a holder of a Competition Licence of a grade no lower than Clubman National B, at all times, except for 14 to 16 year olds, who may drive unaccompanied when competing in an observed section. 10 to 13 year olds will only compete to the 5 mark and must wear the bib provided and a restraining strap at all times while driving. MINOR'S (competitors under 18) must be accompanied at the event by their Parent/Legal Guardian who must hold a Minor's Entrants Licence, as per GCR 108.2.3.
AWARDS 1
st
Overall; 1
st
, 2 nd , 3 rd
in Grades A, B, C & D. No driver may win more than one award.
TIES
as laid down in Motorsport Ireland regulations for Sporting Trials in current MI Yearbook.
ENTRIES Enter and pay by debit or credit card on Club website, www.mec.ie
NB:
IF YOU DIDN'T GET A CONFIRMING EMAIL YOU HAVE NOT ENTERED THE EVENT.
OR: On attached entry form to ROY STEWART, 97 MEADOW MOUNT, CHURCHTOWN, DUBLIN D16 W220 CLOSING DATE (incl. online) 11 TH SEPTEMBER 2024.
ALL ENTRIES MUST BE COMPLETED AND PAID BY CLOSING DATE. NO ENTRIES OR CASH AT EVENT.
In exceptional circumstances and at Club's discretion, late entries may be accepted subject to a late entry fee of €10.
ENTRY FEE - MEMBERS €45; NON-MEMBERS €50; STUDENTS (aged 17-23 in full time education) €25; JUNIOR (aged 10-16) €15. ONE DAY LICENCE €25.
The entry fee includes Competitors Personal Accident Insurance premium. Passengers will have to pay the Personal Accident insurance premium, €5 adults, €3 minors (persons under 18).
IMPORTANT: Cheques to be made payable to 'MOTOR ENTHUSIASTS' CLUB' not 'MEC'
ENTRY FORM
RHODES CUP SPORTING TRIAL - SATURDAY 14 TH SEPTEMBER 2024
Entrant (Name of Parent/Legal Guardian if Driver is a Minor, who must be present at event – See below*)
___________________________________________________________________________________________________
Driver Name_________________________________Address________________________________________________ _____________________________________________________________ Eircode_______________________________
Email ______________________________________________Mobile Telephone No.____________________________
Car_______________________________ Car No.__________ Double Driving with_____________________________
Has your car passed scrutiny for the 2024/2025 season? Yes/No. Grade_______ Student Yes/No. Junior Yes/No.
Competition Licence No._______________ Expiry Date ____________________ MEC Member 2024 Yes/ No.
Driver's Next of Kin (available on day of event) _________________________________ Tel._____________________
Passenger Name__________________________________ Eircode___________________ Tel._____________________
(a) I have read the supplementary regulations issued for this event and agree to be bound by them and by the General Competition Rules and Regulations of MI including the guidelines and regulations contained in Motorsport Ireland's Code of Conduct for Children's Sport. In consideration of the acceptance of this entry or of my being permitted to take part in this event I agree to save harmless and keep indemnified The Motor Enthusiasts' Club, Company Limited By Guarantee (Organising Club), Irish Automobile Club Ltd. t/a Royal Irish Automobile Club, Irish Motorsport Federation Ltd. t/a Motorsport Ireland and their respective officials, servants, representatives and agents from and against all actions, claims, costs, expenses and demands in respect of death, injury, loss of or damage to the person or property of myself, my driver(s), passenger(s) or mechanic(s) (as the case may be) howsoever caused arising out of or in connection with this entry or my taking part in this event and notwithstanding that the same may have been contributed to or occasioned by the negligence of the said bodies, their officials, servants, representatives or agents. Furthermore, in respect of any parts of this event on ground where Third Party Insurance is not required by law, this Agreement shall in addition to the parties named above extend to all and any other competitor(s) and their servants and agents and to all actions, claims, costs, expenses and demands in respect of loss of or damage to the person or property of myself, my driver(s), passenger(s) or mechanic(s).
My age (driver) is ……………..………… (if applicable, state "over 18 years").
My age (passenger) is …………………… (if applicable, state "over 18 years").
(e) Any indemnity and/or declaration as prescribed by sub-paragraph (a) above which is signed by a person under the age of 18 years shall be countersigned by that person's parent or guardian, whose full names and address shall be given. Furthermore, the parents and/or guardians of persons under 18 years of age shall grant permission to MI and the Irish Sports Council to carry out tests in accordance with the Irish Anti-Doping Rules (Rule No 139) in the following form:
"I/We hereby grant permission to MI and the Irish Sports Council to carry out tests as set out in Rule No 139 of the GCRs in accordance with the Irish Anti-Doping Rules."
(f) I agree to abide by and be bound by the Motorsport Ireland Social Media Policy of conduct as per Appendix 126 of the current MI Yearbook.
Drivers Signature________________________________________________________Date_______________________
Passengers Signature_____________________________________________________Date________________________
* IMPORTANT – DRIVERS UNDER 18
Drivers under 18 years of age (Minor) must be entered in the event by their parent/legal guardian (Entrant) who shall be the holder of a Minor's Entrant Licence and must countersign this entry form, below. They must be in attendance at the event. Where an adult sits in the same car as a Minor competitor or Passenger, the adult must be the holder of a Minor's Entrant Licence, if they are not the Minor's Parent/Legal Guardian this licence must include Garda Vetting.
Parent/Legal Guardian Signature___________________________________________ Date_______________________
Address __________________________________________________________ Minor's Entrant Licence No. ________
ENTRIES TO: ROY STEWART, 97 MEADOW MOUNT, CHURCHTOWN, DUBLIN D16 W220
|
<urn:uuid:09a8a3f3-c354-4abb-913a-c782aa6c6174>
|
CC-MAIN-2024-42
|
https://www.mec.ie/wp-content/uploads/2024/08/ST140924-3.pdf
|
2024-10-15T00:40:55+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-42/subset=warc/part-00037-0c083cf2-c0ed-42ad-af5c-44f7548e96a0.c000.gz.parquet
| 744,024,136
| 1,899
|
eng_Latn
|
eng_Latn
| 0.989955
|
eng_Latn
| 0.995354
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3725,
8342
] |
The Potential of Satellites to Control Pollution from Motor Vehicles
Gregory B. Christainsen*
California State University, East Bay
Abstract
This paper argues that onboard diagnostic systems linked via vehicle transponders to satellites could provide the basis for a more efficient and potentially global approach to controlling pollution from motor vehicles. Motorists would be subject to multiple emissions charges: (1) a one-time charge when a vehicle is first sold; (2) a recurring charge that would depend on the distance driven during each period of time; and (3) an additional charge in the event of improperly maintained equipment pertaining to pollution abatement. The use of transponders and satellites for (2) and (3) would make conventional smog testing obsolete and would result in large cost savings.
I. Introduction
In light of recent developments in satellite technology, this paper discusses a provocative and potentially global approach to the burning of fossil fuels by motor vehicles. The approach raises several questions – as does any plausible approach to motor vehicle pollution. The paper will address some of the more important questions in the space available, but it should not be viewed as the last say on the matter. Rather, it is intended to be part of an ongoing discussion.
During the last 40 years, governments have required that new vehicles meet ever-tougher emissions standards. However, a disproportionate amount of the pollution from motor vehicles comes from older vehicles (U.S. Environmental Protection Agency, 2000),¹ and the more stringent emissions standards for new vehicles make
* This paper was originally prepared for the 2007 conference of the Association for Private Enterprise Education. The author would like to thank two anonymous referees and the editor for helpful comments. The usual disclaimer applies.
¹ For more recent data, see USA Today, 18 June 2007, A1.
them more expensive and actually encourage people to retain ownership of older vehicles for a longer period of time than would otherwise be the case.
In areas that have been behind schedule in meeting federal air quality standards, older vehicles can be required to pass a smog test as a condition for remaining on the road. That is very costly, however, in terms of both out-of-pocket expenses and drivers’ time to have millions of vehicles brought in to be checked. Cheating on smog tests is also thought to be widespread.
As an alternative, economists have frequently recommended that vehicles be charged directly for their emissions, regardless of whether the vehicles are new or old. But most such proposals have still relied on motorists to bring in their vehicles to be checked, at least in terms of the distance that they have been driven during a particular period of time. Thus, some policymakers have simply recommended that older vehicles be charged higher registration fees or that factories or oil refineries be given credit for pollution reductions if they buy up older vehicles and take them off the road.
Efforts to place “remote sensing” devices near freeway on-ramps and off-ramps or at other strategic locations to try to detect high-emission vehicles (without these vehicles needing to be checked at service stations) have been intriguing (e.g., Klein, 2003), but somewhat controversial. The U.S. Environmental Protection Agency (EPA) has viewed remote sensing as a complement to, but not a substitute for, ordinary smog tests (U.S. Environmental Protection Agency, 1994). Some of the concerns expressed by the EPA – for example, the feasibility of assessing vehicles’ emissions of nitrogen oxides – have already been addressed or may be resolved in the near future. As this paper will discuss, remote sensing merits continued consideration, but whether it should be the main way by which vehicle emissions are monitored remains an open question.
Satellite monitoring of vehicles is a more recent and exciting development. Satellites are now used to levy emissions charges on trucks driving on Germany’s autobahns (SPC Media, 2007). Satellite charging has been tested and seriously considered in Hong Kong as well (Wilbur Smith Associates, 2000).
This paper links the discussion to the more general issue of how to best price the use of roadways. Singapore began pricing entry into its Central Business District in 1975, and it now employs more extensive – and electronic – pricing that varies according to vehicle
type and traffic conditions (Christainsen, 2006). London introduced congestion pricing inside its inner-ring road in 2003 (New York Academy of Sciences, 2007). Stockholm launched a pilot pricing program in its downtown area in 2006. A permanent road pricing program began in 2007 (Stockholmsforsoket, 2007).
Road pricing exists in a few other places as well, but outside of Germany, satellites remain an untapped mechanism for charging vehicles. While it can be readily seen that satellites offer a potentially global approach to the management of traffic congestion and vehicle pollution, there remain sensitive issues involving civil liberties and government control over the satellites themselves.
Section II of this paper outlines U.S. policies with respect to pollution from motor vehicles. Section III discusses the possible use of emissions charges vs. direct controls over emissions or vehicle gas mileage. Subsidies for alternative fuels that are alleged to be less polluting than fossil fuels (e.g., ethanol) are also discussed.
Section IV of the paper looks at the technological and administrative issues relevant to the use of satellites or related technology for assessing emissions charges. The use of satellites as opposed to remote sensing (without satellites) is discussed. Germany serves as a case study in satellite charging; its experiences can be compared to places like Singapore that already have electronic road pricing that is not based on satellites. Hong Kong is also worth mentioning insofar as it has conducted field tests that have attempted to assess the efficacy of satellite use.
Section V discusses the possibility of extending ordinary liability law to those deemed responsible for motor vehicle pollution. Section VI offers a tentative conclusion to the paper, but it must be emphasized that the relevant technologies (and their costs) are still evolving.
II. U.S. Policies Regarding Pollution from Motor Vehicles
The federal Clean Air Act, which was signed into law in 1963, has dominated American policy. The Act is administered through the U.S. Environmental Protection Agency. As we shall see, California has also been especially noteworthy for its pollution control initiatives. Federal legislation regarding the so-called corporate average fuel economy (CAFE) of motor vehicles has been in place since 1975, and is administered through the U.S. Department of Transportation.
The 1977 Clean Air Act amendments divided the country into two main parts: those areas whose air quality was in compliance with federal air-quality standards, and those areas whose air quality was not in compliance. The 1977 amendments required that states with nonattainment areas institute inspection and maintenance programs for vehicles already on the road. This has meant that vehicles registered in nonattainment areas must be brought into service stations or other facilities for periodic smog tests and checks of their pollution abatement equipment.
In 1987 the California Air Resources Board required that all new vehicles sold in California starting in manufacturer's year 1988 have onboard diagnostics capability. This involves outfitting a vehicle with myriad sensors that give the owner or a repair technician access to state-of-health information for various vehicle sub-systems, including the equipment pertaining to pollution abatement. The 1987 California requirements are generally referred to as the "OBD-I" standard, though this name was not applied until "OBD-II" rules were issued by the U.S. Environmental Protection Agency. The 1990 amendments to the federal Clean Air Act mandated the OBD-II rules, which became effective for new vehicles in 1996.
Early versions of onboard diagnostic systems simply illuminated a malfunction indicator light if a problem inside a vehicle was detected, but no information was provided as to the nature of the problem. More recent technology includes a high-speed digital communications port to provide vehicle data in real time as well as a standardized series of diagnostic trouble codes. These codes enable technicians to quickly identify and remedy vehicle malfunctions.
The 1990 amendments to the Clean Air Act also contained a measure under which certain nonattainment areas were required to establish programs for the adoption of clean fuel vehicles by centrally managed vehicle fleets. California now requires that vehicle manufacturers sell a certain number of "clean vehicles" as a condition for selling any vehicles (of any kind) in the state.
III. Emissions Charges vs. Direct Emissions Controls, Mandates for "Clean" Vehicles, Subsidies for "Clean" Fuels, or Mandates for Greater Fuel Economy
As emphasized by F. A. Hayek (1978), the market is a discovery process. The optimal amount of anything cannot be known in advance. No one knows ahead of time the "right" number of pencils,
file cabinet drawers, bicycle reflector lights, or Phillips screwdrivers, but we can be confident that the outcome of the market is quite efficient in the sense that business enterprises have incentives to produce these items as long as (and only as long as) people value them as much or more than the costs of providing them. The lowest cost way of providing each item is also subject to discovery.
Just as with pencils, the "right" amount of motor vehicle pollution abatement is unknowable in advance. Nor can the lowest cost method of abatement be known ahead of time. Even if government officials had such knowledge, public choice theory, spearheaded by James Buchanan and Gordon Tullock (1962), emphasizes that there might still be considerable inefficiency. The political process is not the same as the market process because it lacks the same system of property rights. The decisions necessary to attract campaign contributions and votes and to secure administrative positions may be economically perverse. Thus, even if government officials did know the right amount of abatement and the lowest cost way of doing it, they might not enact legislation that is economically efficient.
Direct emissions controls are inefficient if emissions could have been abated at less cost with a different approach. They are also inefficient if, for the same cost, people put a higher value on something besides cleaner air.
The primary federal air pollution standards are based on human health considerations. In other areas of life, however, people often accept health risks in exchange for other benefits. For example, people may eat ice cream even though they are aware that it has significant amounts of unhealthy cholesterol. The mere act of riding in a motor vehicle involves accepting some amount of risk to life and limb.
The current system of vehicle emissions controls is grossly inefficient in two other ways. First, early on, Arnold Reitze (1979, p. 735) pointed out that, even if one took a conservative view of what the costs were, the costs of abating pollution via inspection and maintenance programs were two to three times higher than the costs of abating the same pollutants via regulation of factories and other stationary sources of emissions.
Second, most motor vehicle pollution comes from a relatively small number of high-emission vehicles. Most vehicles run fairly cleanly (University of Denver, 2007). Insofar as the problem vehicles
can be identified, much cleaner air could be had at much less cost if the great majority of vehicles that run fairly cleanly were, for the most part, left alone. Remote sensing and satellite monitoring of vehicles have considerable appeal in this regard.
Requiring that a certain percentage of the new vehicles sold has zero (or quite low) emissions is objectionable because it does nothing to weigh benefits and costs. Such an approach presumes knowledge on the part of government officials that they, in fact, do not have. No one can know in advance the right number of low-emission vehicles. Officials who themselves bear only a trivial portion of the total costs of government policies may nevertheless have public choice incentives to show that they are “doing something” about pollution by mandating their production.
It should therefore also be clear that corporate average fuel economy requirements – “CAFÉ standards” – are objectionable as well. Given their cost and their encouragement for the manufacture of lighter, but less safe vehicles (other things equal), who really knows the “right” gas mileage for motor vehicles?
Simply charging a vehicle for emissions, regardless of vehicle age, has great appeal to economists because it obviates at least a good part of the Hayekian knowledge problem. If vehicle owners could be held directly responsible for their emissions, car buyers could then be left free to buy any vehicles they like. Some buyers might buy high-emission cars or cars with relatively poor gas mileage, but they would then be subject to comparatively heavy emissions charges. Others might opt for low-emission (or even zero-emission) vehicles and/or vehicles with extremely good gas mileage, but these vehicles might be relatively expensive. Some vehicle owners might decide that the most economical course of action would be to upgrade the pollution control equipment on a car they already have. Once emissions charges were in place, it would be up to the market to sort out the emissions and equipment characteristics of the various vehicles and the number of vehicles of each type to be produced. The gas mileage of vehicles would likewise be a market-determined outcome.
Whether vehicles would even run on gasoline could not be known in advance for all time. Some demand for corn-based ethanol might exist, but with charges in place on vehicles (and/or ordinary gasoline), its production would no longer plausibly justify a separate subsidy. It might be desirable to buy a vehicle that runs on an even cleaner fuel – hydrogen? Solar power?
The main point is that government officials, even if they be intelligent people, are not competent to micromanage the outcomes in a reasonable way. The fact that corn-based ethanol is simultaneously mandated, subsidized, and subject to import restrictions—a 54 cent per gallon tariff—makes clear that politicians are often more concerned about protecting farmers’ interests than they are in an efficient approach to motor vehicle pollution.
However, any system of emissions charges itself faces difficult issues. A somewhat flawed system of charges might still be superior to more extensive government command and control, but the problems should not be denied. First and foremost is the question of how high the charges should be for the various pollutants. Should they not differ by location? In places where pollution is a severe problem, it would be efficient to have higher charges. In other areas, it would be appropriate to have lower charges or no charges at all. From the standpoint of neoclassical economics, an efficient charge would be equal to the pollution damages attributable to an incremental vehicle.
There is a public choice problem as well as a knowledge problem. If government officials are involved in levying charges, might not the levies be distorted by political considerations? Governments are currently responsible for managing most roadways. Why do most major metropolitan areas lack any road pricing, let alone efficient road pricing? If emissions charges are economically efficient, why haven’t government officials already enacted them?
Aside from these fundamental questions, there are more practical concerns about how a charge system would be implemented. When such ideas were initially discussed, the most prominent proposals were those made by Lawrence J. White (1973, 1976, 1982). In his pollution control scheme, a charge would be assessed on each new vehicle dependent on the average emissions level of vehicles in its class. Vehicles would thereafter be subject to periodic smog tests. At the conclusion of each smog test, a new charge would be levied based on the vehicle’s current emission level and the distance that the vehicle had been driven since the previous charge had been assessed. Charges would vary by location.
As with inspection and maintenance programs generally, the main practical drawback of White’s proposals was the requirement that all vehicles be inspected on a regular basis. As mentioned, this devours, in the aggregate, a tremendous amount of people’s time in addition to
the out-of-pocket expenses involved. Since most vehicle pollution is caused by a modest number of heavy polluters, such programs are akin to frisking the whole population to catch a small group of serious pickpockets.
IV. Technology, Remote Sensing, and Satellite Charging
1. Remote Sensing as an Alternative to Conventional Smog Tests
Remote sensing represents a valiant effort to detect high-emitting vehicles without needing to bring all vehicles in to be inspected at service stations. Unlike most equipment used to measure vehicle emissions today, remote sensing devices do not need to be physically connected to the vehicle.
Remote sensing systems employ an infrared absorption principle to measure emissions. They operate by continuously projecting a beam of infrared radiation across a roadway. The system's detectors receive strong infrared light signals through the air when no vehicle emissions are in the path. If some amount of pollution is present in the path, it will absorb some of the light at the pollutant's unique wavelength.
Remote sensing systems are capable of making all of the calculations necessary to assess a vehicle's pollution characteristics in just 0.7 seconds. The systems also employ a freeze-frame video camera and equipment to digitize a color image of the rear of the tested vehicle, including the license plate. This allows the system to store emissions information for each monitored vehicle based on the license plate number. Since the unit is permanently installed in a van, it can be set up quickly without affecting the traffic flow. The unit can be moved from one site to another throughout an area. However, at present no states rely exclusively on remote sensing to check vehicle emissions. The plausible, nonpolitical reasons for this include:
(1) Current remote sensing systems can measure tailpipe emissions of hydrocarbons, carbon monoxide, carbon dioxide, and nitrogen oxides, but they cannot measure the evaporative emissions that vent directly into the air because of defective gas caps or fuel lines. Evaporative emissions are a very significant source of hydrocarbon pollution. The pollution can exceed that from tailpipe emissions on hot days when ozone levels are highest (U.S. Environmental Protection Agency, 1994). Remote sensing systems are also not very advanced in detecting emissions of particulate
matter, although their performance in this regard seems likely to improve. Finally, such systems are even more handicapped in detecting emissions of lead, although leaded gasoline was banned from general use in 1995.
(2) Remote sensing systems cannot identify vehicles with defective pollution abatement equipment, even in cases where a vehicle’s dashboard has an illuminated malfunction light, unless the vehicle has already been emitting high amounts of pollution.
(3) Identifying a majority of the high-emitting vehicles might require a very large number of tests throughout a metropolitan area – perhaps in the hundreds of thousands or millions over a multi-year period. To save on testing costs, it might then be necessary simply to threaten high-emitters with very large fines on the understanding that many high-emitters would not, in fact, be detected. As with any system of emissions charges, a decision would need to be made about how high the charges would be. Political considerations could affect charges and the choice of testing locations. Thus, while remote sensing has attractive features in terms of focusing on gross polluters (Klein, 2003), it also faces at least some knowledge and public choice problems.
2. Satellites
Satellites and related technology (e.g., cellular telephones) now make possible an alternative approach. This approach is arguably simpler, more proactive, more comprehensive in terms of geography and pollutants covered, and more economical than ferrying remote sensing equipment all over metropolitan areas. It also makes use of the onboard diagnostics that have been standard in new vehicles since 1996 and links them to a transponder.
This possibility is already being called OBD-III, to distinguish it from OBD-II, which does not involve a transponder. The transponder would have the ability to transmit diagnostic data instantaneously to a control center via the already-existing network of low-earth-orbit satellites. Thus, if pollution abatement equipment were not properly maintained, the control center would be informed immediately – without the necessity of bringing in the vehicle for a smog test. The sensors in the pollution abatement equipment are so proactive that a light appears on a driver’s dashboard even before the vehicle’s emissions level increases significantly. A transponder can also easily transmit information about the distance that a vehicle has
been driven during any given period of time.
Thus, as with White’s original proposals, an emissions charge could be levied at the time a vehicle is purchased and additional charges assessed based on the distance a vehicle is driven over time. In the event that the diagnostic data indicate that equipment that is relevant to a vehicle’s emissions needs repair, still another charge would be levied (perhaps after a modest grace period) until the problem was fixed. The charge could depend on the distance driven with the defective equipment.
Note that the system is capable of identifying defective gas caps and fuel lines as well as detecting problems with catalytic equipment and making odometer readings. It can also detect efforts to tamper with equipment. (Technology now available in newer vehicles allows onboard sensors to directly measure emissions that must otherwise be assessed by attaching a hose to the vehicle’s tailpipe. However, this technology does not measure evaporative emissions.)
It would in any case be desirable to give credits, as California has done, to stationary source polluters (e.g., oil refineries) who buy up high-emitting vehicles and take them off the road. If it is cheaper for the stationary source simply to abate its own pollution, it would have an incentive to do so. The number of credits that a stationary source would get for taking a “clunker” off the road would depend on factors such as the remaining useful life of the vehicle and the estimated number of miles it would have been driven had it stayed in operation.
3. Germany as a Case Study of Satellite Charging
As is the case for the other approaches already discussed, satellite charging must also confront knowledge and public choice problems. In 2005 such charging began on the 12,000 kilometers of German autobahns for trucks with a maximum weight of 12 or more metric tons. Vehicles may pay charges manually in advance at service centers or online and obtain a receipt for doing so. Trucks with transponders are billed on a monthly basis. Charges vary with the distance driven, the number of axles, and the air pollution emissions class of the vehicle; these average out to about 0.12 euros per kilometer. The launch of the system was delayed, but it has since performed admirably. The upfront capital outlay was about 700 million euros. The technology for the system has been supplied and administered by Deutsche Telekom, Daimler Chrysler, Cofiroute (France),
EFKON (Austria), and, at a later stage, Siemens (SPC Media, 2007).
To ensure that toll evaders without transponders do not exist, the system requires that the satellites be supplemented with ground-level surveillance for the time being. This surveillance is accomplished via cameras and patrol cars. Cameras are positioned on close to 300 highway overpasses or other overhead structures, and nearly 300 patrol cars are involved in enforcement. Thus, there is about one overhead structure and one patrol car for every 40 kilometers of autobahn. In the future transponders may be standard equipment that could be outfitted with sensors as part of an onboard diagnostic system. The sensors could detect efforts to tamper with or disable transponders and would thereby greatly reduce enforcement costs.
Germany has thus joined Singapore, London, Stockholm, and a few other places in the vanguard of electronic road pricing. Singapore, London, and Stockholm stand out insofar as they conduct pricing in a quite deliberate effort to moderate traffic congestion on downtown streets. As far as motor vehicle pollution is concerned, it should be emphasized that vehicles stuck in traffic jams are themselves significant contributors to pollution concentrations. However, none of these cities employs satellites.
Hong Kong, which has a serious air pollution problem, has field-tested satellites as an alternative to the ground-level gantries employed in Singapore (Christainsen, 2006). Satellites were found to be just as reliable and more cost-effective once the number of pricing points in the metropolitan area reached 42 (Wilbur Smith Associates, 2000). Satellites thus performed quite well in the Hong Kong tests, but no action to institutionalize road pricing has been taken to date.
V. Emissions Charges and Legal Systems
While many environmental economists support the concept of emissions charges, some would ideally like to internalize pollution costs via the assignment of property rights to the resources in question (e.g., Anderson and Leal, 2001). It is perhaps easier to see how this can be done for water pollution than for air pollution. For example, if a factory polluted a stream, and property rights to the stream’s flow of water were defined, the rights holder could file suit against the factory owner for damages. Alternatively, the rights holder and the factory could negotiate an arrangement under which the factory could continue to operate in certain ways and at certain times. Property rights would provide a backdrop against which the market
would determine the precise outcome. Pollution costs in the form of legal damages or agreed-upon precautions would thus be internalized by the factory owner and would need to be considered in any subsequent production decisions.
The most grandiose effort to assert property rights to the air in the case of motor vehicle pollution has probably been the case of *Roger J. Diamond v. General Motors*. This case was brought before a judge in the Superior Court of Los Angeles in 1971 (20 C.A. 3d 374 (1971)). The plaintiff, Roger J. Diamond, filed a class action suit on behalf of all property owners in Los Angeles. He named 293 defendants, including major automakers and oil refineries, and alleged that they had fouled the air of the property owners.
The judge threw out the case, calling it “unmanageable.” He noted that in the common law a distinction exists between a private nuisance and a public nuisance. The former involves cases with a small number of people and very local activity. For example, if a neighbor of mine repeatedly hosts backyard barbecues that cause fumes to invade my property, I could conceivably sue him if efforts to persuade him to “tone it down” did not suffice. In the case of motor vehicle pollution, however, it would be extraordinarily difficult or impossible to say who precisely had damaged whom, and by what dollar amount. There are millions of people and millions of vehicles in the Los Angeles area, which is hundreds of square miles. Thus, the judge categorized motor vehicle pollution as a “public” nuisance, to be addressed by public regulation. However, as Roger Diamond himself stated in court, regulation may be subject to undue influence by the very parties who are subject to it – a familiar part of public choice theory.
With very little argument, Murray Rothbard (1997 [1982], p.161) maintained that, if roadways were privatized, the liability for motor vehicle pollution could and should be shifted to the roadway owners. Such an approach would change the names of the defendants to be charged in a massive class-action lawsuit,\(^2\) but it would still be a
\(^2\) Rothbard later (1997 [1982], p.164) argued that the joinder of multiple defendants in a lawsuit ought to be permitted only if they acted in concert. Since polluters do not generally act in concert, a victim of automobile pollution would thus have to sue vehicle owners (or roadway owners) one by one. He also argued that plaintiffs ought to show that the actions of the defendants caused them injury “beyond a reasonable doubt” (and not just by a “preponderance of the evidence,” the norm for civil suits today). Rothbard recognized that it would then be virtually impossible
gigantic task to apportion damages among numerous roadway owners. How many private roadway owners would emerge in the Los Angeles area? Hundreds? Thousands? Nobody knows. Under a system of government-sponsored common law courts supplemented by legislation, it seems likely that courts would still hold that motor vehicle pollution is a “public” nuisance, although roadway owners might sometimes be held liable in very local cases involving traffic safety.
Of course, Rothbard was a famous proponent of anarchism, under which government-sponsored courts and legislation would no longer exist. He hoped for an ideological shift under which private courts would safeguard a regime of unfettered private property rights, absolute freedom of contract, and strict liability for torts. Christainsen (1990) argued that the rules emanating from a private legal system could not be preordained for all time, but would, in more Hayekian fashion, need to be subject to a continual process of market feedback and discovery. In this way, competing private courts could arguably confront the knowledge problem more capably than governments and uncover ever-evolving rules to limit pollution from motor vehicles. No one can say for sure whether the court enterprises would end up administering emissions charges, or whether they would opt for a completely different approach.
If we must instead rely on something like the current federal system to oversee the legal process, we must hope for a reasonable “constitutional contract,” as envisioned by Buchanan and Tullock (1962). The constitutional contract would involve the federal government (or negotiations among state governments) insofar as air pollution spills over from one state to another, but would still rely on state and local governments in much of the decision-making. As matters stand, the federal government sets air quality standards and requires inspection and maintenance programs in areas that have not been in compliance with them, but the details of the policies to be implemented are formulated by the states and then submitted back to the federal government for approval. In a Buchanan and Tullock type of constitutional contract, states and localities would have great leeway in setting emissions charges, and residents could “vote with
for victims of automobile pollution to take effective action in court, but also argued that impracticality should not count against his vision of justice!
their feet” and move elsewhere if they were quite dissatisfied with the air quality and/or the emissions charges where they currently live.
VI. Conclusion
Motor vehicle pollution remains one of the most difficult of public policy challenges. While it is rather easy to criticize current policies, formulating an alternative that is both reasonably efficient and workable is a trying task. Advocates of free markets, who seem rather sure of themselves when discussing other issues, appear noticeably less confident when faced with the realities of emissions emanating from millions of mobile sources.
It will take time for all vehicles to include onboard diagnostics, but the process has advanced quite far at this point. Including transponders in the system will be another major step, but congestion as well as pollution issues are pushing public policy in that direction. As we have seen, congestion pricing is a natural complement to direct charges for pollution control because congestion tends to increase vehicle emissions. Satellite technology could be efficaciously used to administer both.
Concerns about civil liberties as well as purely economic ones are at stake. If government authorities will be monitoring vehicles via satellites and transponders, they could find out exactly where and when vehicles have been driven. This information may be relevant to efficient charging, but it may also be viewed as a threat to privacy. Credible safeguards must therefore be built into the system.
Singapore is not the best example of a place that respects privacy, but it is noteworthy in that its road pricing involves prepaid smart cards. These cards are inserted into vehicle transponders (which have become standard equipment), and charges are deducted from the balance on each card as vehicles pass under pricing gantries. *It is not necessary for the authorities to know the identity of a vehicle or who owns it unless there is some kind of violation* – i.e., no card has been inserted into the vehicle transponder, or the balance on the card is not sufficient to pay the charge in question. In any case, all records regarding the gantries under which vehicles have passed are destroyed within 24 hours except as they might pertain to an allegation that a vehicle was wrongfully charged.\(^3\)
---
\(^3\) Gopinath Menon, formerly Senior Manager, Land Transport Authority, Republic of Singapore, and one of the original architects of Singapore’s road pricing system [personal communication].
A sophisticated set of emissions charges (and fuel taxes) would likely accelerate the current movement away from fossil fuels. As this paper has intimated, it remains to be seen whether real-world governments can administer charges very efficiently, but a better choice may not be available. Remote sensing of vehicle emissions should still be a part of the discussion, but the performance of the vehicle charging systems in Singapore, London, Stockholm, and Germany has been encouraging. Greater use of satellites and enhanced onboard diagnostics are the next frontier.
References
Anderson, Terry, and Donald Leal. 2001. *Free Market Environmentalism*. 2nd ed. Hampshire, UK: Palgrave Macmillan.
Buchanan, James, and Gordon Tullock. 1962. *The Calculus of Consent: Logical Foundations of Constitutional Democracy*. Ann Arbor: University of Michigan Press.
Christainsen, Gregory. 1990. “Law as a Discovery Procedure.” *Cato Journal*, 9(3): 497–530.
Christainsen, Gregory. 2006. “Road Pricing in Singapore After Thirty Years.” *Cato Journal*, 26(1): 71–88.
Hayek, F.A. 1978. “Competition as a Discovery Procedure.” In *New Studies in Philosophy, Politics, Economics, and the History of Ideas*, 179–190. Chicago: University of Chicago Press.
Klein, Daniel. 2003. “Fencing the Airshed: Using Remote Sensing to Police Auto Emissions.” In *The Half-Life of Policy Rationales: How Technology Affects Old Policy Issues*, eds. Fred Foldvary and Daniel Klein, 86–106. New York: New York University Press.
New York Academy of Sciences. 2007. Christine Van Lenten. “London Leads the Way.”
http://www.nyas.org/ebrief/miniEB.asp?eBriefID=644#meetingrep5200. (accessed November 9, 2007).
Reitze, Arnold. 1979. “Controlling Automotive Air Pollution through Inspection and Maintenance Programs.” *George Washington Law Review*, 34(2): 723–748.
Rothbard, Murray. 1997. “Law, Property Rights, and Air Pollution.” In *The Logic of Action Two*, 121–170. Cheltenham, UK: Edward Elgar, 1997. Originally published in *The Cato Journal*, 2(1): 55–99 (1982).
SPC Media. 2007. “LKW-Maut Electronic Toll Collection System for Heavy Goods Vehicles, Germany.” http://www.roadtraffic-technology.com/projects/lkw-maut. (accessed November 9, 2007).
Stockholmsforsoket. 2007. “Evaluation Reports.” http://www.stockholmsforsoket.se/templates/page.aspx?id=12555. (accessed November 9, 2007).
U.S. Environmental Protection Agency. 1994. “Automobile Emissions: An Overview.” http://www.epa.gov/otaq/consumer/05-autos.pdf. (accessed November 9, 2007).
U.S. Environmental Protection Agency. 2000. “Emission Facts: Average Annual Emissions and Fuel Consumption for Passenger Cars and Light Trucks.” http://www.epa.gov/otaq/consumer/f00013.htm. (accessed November 9, 2007).
University of Denver. 2007. Fuel Efficiency Automobile Test Data Center. “Fuel Efficiency Automobile Test Reports.” http://www.feat.biochem.du.edu/reports.html. (accessed November 9, 2007).
White, Lawrence. 1973. “The Auto Pollution Muddle.” The Public Interest, 32: 97–112.
White, Lawrence. 1976. “American Automotive Emissions Control Policy: A Review of the Reviews.” Journal of Environmental Economics and Management, 2(4): 231–246.
White, Lawrence. 1982. “U.S. Automotive Emissions Controls: How Well Are They Working?” American Economic Review, 72(2): 115–119.
Wilbur Smith Associates. 2000. The Hong Kong Electronic Road Pricing (ERP) Feasibility Study. Hong Kong.
|
<urn:uuid:aa39a656-0813-45b1-a496-6de3fe581406>
|
CC-MAIN-2021-10
|
http://journal.apee.org/index.php?action=ajax&rs=GDMgetFile&rsargs%5B%5D=Spring2008_4.pdf
|
2021-03-05T17:01:56+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-10/subset=warc/part-00209-dbb5a216-bcb2-4bff-b117-e812a7981d21.c000.gz.parquet
| 49,836,080
| 7,461
|
eng_Latn
|
eng_Latn
| 0.959769
|
eng_Latn
| 0.997376
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
1925,
4467,
6891,
9349,
11809,
14387,
16930,
19300,
21724,
24198,
26765,
29462,
31917,
34425,
36470,
37850
] |
Video Customer Engagement For Money Lending
Use Cases
Business Challenge
* Virtualize the lending process with high-quality video meetings and document sharing
* Make digital, transactional inquiries consultative with phone or chat escalation to video
* Allow face-to-face access to experts regardless of location
* Expedite customers' decisionmaking with multi-person video calls
Benefits
* Greater customer convenience: Loan applicants can meet with the best resource to serve their needs without visiting a branch
* Stronger customer relationships: Loan officers can establish an emotional connection at each step of the lending process, even during remote interactions
* Better loan closure rate: Building trust ultimately helps lenders stand apart from competition and win the deal
* Shorter sales cycle: Meetings are easier to schedule, and improved mutual understanding helps speed up the loan applicant's decisionmaking process
© Vidyo, Inc.
The loan market is competitive, especially for higher-value transactions like mortgages, car loans, or business loans. Customers want to compare proposals from various lenders to make an informed decision. Beyond lower interest rates or specific loan terms and conditions, building confidence and trust with loan applicants and offering them advanced expertise are key to maximizing the chances of winning a deal. But three main challenges must be overcome:
* The loan application process is complex. Loan application processes typically require multiple interactions between the applicant and the financial institution. As in any sales process, one of these interactions can be the moment a prospect chooses a lender. But many interactions occur over email or phone, which do not provide a strong opportunity for financial advisers to effectively build personal relationships.
* Relationships must be built with several decision makers. In many households, the decision-making process for a mortgage or a car loan involves more than one individual. But the more people involved, the more difficult it is to schedule a meeting convenient for everybody, which can lead to longer loan processing time.
* The right expert must be available when needed. A branch representative with general knowledge sometimes needs a colleague with advanced expertise to help a loan applicant. But having an expert on every topic available in every branch is not realistic or affordable, so offering specific expertise to loan applicants can be challenging.
Vidyo Solution
For financial services organizations that need to expedite the lending process, VidyoEngage™ is a customer-facing video solution that bridges the gap between online convenience and interpersonal connections. With VidyoEngage, the highest-quality real-time video can be integrated into the organization's website, mobile app, or in-branch kiosk for a face-to-face interaction that creates deeper customer loyalty and trust.
Using VidyoEngage, the loan adviser and the loan applicant can have a much more personal and meaningful conversation. The high quality of the video allows them to have a meeting that feels like an in-person experience, and the ability to share content such as mortgage simulation charts makes meetings much more effective than phone calls. Customers can attend video meetings wherever they happen to be — at home, at their office, on the go — and with the device of their choice, whether computer, smartphone, or tablet.
The most appropriate experts can be available so loan applicants can have a rich meeting experience with them from their own device or while in a meeting in a branch with their loan adviser.
Similarly, if the loan applicant's spouse or business partner needs to be involved in the discussion, he or she can join the meeting from a different location and participate fully in the conversation.
Last but not least, by integrating a digital signature component into the Vidyo solution, the paperwork can be signed during a video meeting, resulting in faster loan turnaround time.
Feature Overview
Click-to-Connect
Designed with the client in mind — seamless experience to join, single click to connect
High-Quality Audio/Video
High-quality audio and video replicates an in-person meeting experience
White-Labled User Interface
Professionally branded and customized multiparty video experience
Skills-Based Routing
Skills-based routing, with the ability for multiple call queues
Branded Customer Queue
Branded waiting treatments, such as advertisement videos
Document Sharing
Ability to share content from any application or screen, and customizable settings to limit sharing to specific applications
Enghouse Interactive (UK), Inc. Imperium, Imperial Way, Reading RG2 0TD United Kingdom https://enghousefinancial.technology/
© Enghouse Interactive, Inc. All rights reserved.
Results
Loan applicants are more engaged with the lending organization at each step of their decision-making process and they get access to the right expertise when they need it.
Loan advisers are able to build greater customer intimacy and better address the needs of their prospects.
Ultimately, the loan process is shorter and loan closure rates increase.
Advisor Authentication
Adviser authentication via locally authenticated credentials, Active Directory via LDAP, or SAML/ADFS
Multi-channel
Consistent process over all channels — web, mobile, and in-branch
Screenshot Documents
Ability to take a snapshot of an identity document*
Digital Signature Integration
Ability to integrate with leading digital signature solutions
Call Recording
Optional call recording for agent training or compliance
Contact Center Integration
Ability to integrate with leading contact center platforms
|
<urn:uuid:1279fbb7-2bdb-48b4-ab95-98baf1ac7287>
|
CC-MAIN-2024-10
|
https://info.enghouseinteractive.com/rs/547-FBA-390/images/enghouse-vidyo-finance-banking-money-lending.pdf
|
2024-03-02T17:50:04+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-10/subset=warc/part-00104-d9675c6d-5c8d-45bb-9c98-c56e42022a4d.c000.gz.parquet
| 301,714,386
| 1,043
|
eng_Latn
|
eng_Latn
| 0.994944
|
eng_Latn
| 0.995552
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3458,
5751
] |
Background
On November 18, 1998, the Board of Supervisors adopted a recommendation made by the Department of Health Services (DHS), with the support of the Auditor-Controller and the Internal Services Department (ISD), to authorize DHS to participate in a healthcare Group Purchasing Organization (GPO). The basis for effectuating this action was to sanction the use of the GPO's aggregated purchasing power in cases where the County would achieve cost savings by purchasing medical, surgical, laboratory and pharmaceutical equipment and supplies through University Health System Consortium (UHC) commodity agreements established by Novation. On September 27, 2016, the Board of Supervisors accepted the assignment and delegation from Novation to Vizient.
Where appropriately analyzed and demonstrated to result in cost savings, the use of Vizient agreements represented a viable alternative to the County's established solicitation, award and agreement processes on a case-by-case basis.
Policy
As the Purchasing Agent for the County of Los Angeles, ISD retains the exclusive statutory authority for the purchase of all furnishings, materials, supplies, fixtures, equipment, and all other personal property required by County departments. In this role, ISD is responsible to ensure that purchases, whether from a solicitation, a County agreement or a non-County agreement, are cost effective, and that the acquisition process conforms to established purchasing policies and procedures, to include the standards and requirements set forth by Charter, State law, and applicable provisions of the County code.
As such, the GPO program purchases remain under the authority of the County Purchasing Agent. ISD delegates purchasing authority to DHS to access Vizient agreements for medical, surgical, laboratory and pharmaceutical consumables and supplies and medical equipment and related parts with a unit value if less than $5000 without prior approval by ISD.
Procedure
DHS is authorized to purchase the following material through competitively solicited Vizient agreements:
2. Medical equipment and related parts with a unit value of less than $5000
1. Medical, surgical, laboratory, and pharmaceutical consumables and supplies;
Vizient Agreement Renewals:
If a current ISD-approved Vizient agreement is renewed with the same vendor or expires, is resolicited and awarded to the same vendor and with the same product category, access to the renewed or new agreement will automatically be granted by ISD.
Any access to a Vizient agreement will be coordinated by DHS Corporate Office of Supply Chain Operations (SCO). The DHS Corporate office of SCO is responsible to coordinate GPO activities within DHS and between DHS and ISD, and will maintain a listing of all ISD approved and DHS accessed Vizient agreements.
DHS Corporate office of SCO shall notify ISD of the Vizient agreements accessed by the Department.
Restrictions
County departments are not authorized to purchase non-medical products/equipment, capital equipment, medical equipment with a unit value greater than $5000 and/or services from Vizient agreements.
|
<urn:uuid:e8ff62ef-5e82-4ce6-b146-5a67843926ce>
|
CC-MAIN-2024-22
|
https://doingbusiness.lacounty.gov/wp-content/uploads/2018/01/P-1900.pdf
|
2024-05-30T11:55:31+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-22/subset=warc/part-00297-4dd72944-e9c0-41a1-9026-dfd2d0615bf2.c000.gz.parquet
| 179,515,915
| 607
|
eng_Latn
|
eng_Latn
| 0.989413
|
eng_Latn
| 0.988784
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2927,
3139
] |
Fast, affordable life insurance coverage
Equitable Term-in-10sm offers the protection you need in just 10 minutes
If you're investing for retirement, planning a family, or saving for college or a home, you may be one of 41 million Americans who need life insurance coverage, but don't have it. 1 Term-in-10sm is simple, flexible term life insurance protection with an all-digital, noninvasive experience. No exam is needed, so you can apply in minutes, get a decision in seconds and receive the protection you need in just 10 minutes or less.
Why don't you have life insurance?
Get life insurance in just 10 minutes
Don't wait weeks or even months for term life insurance coverage. Term-in-10sm takes only 10 minutes from start to finish, with no medical exams, labs or visits to a doctor's office. While this product may not be suitable for everyone, it's a fast and efficient way for healthy consumers to get coverage sooner. 2
Here's how it works
You will receive a Term-in-10 sm email containing the link to begin your application.
Submit your application to determine your eligibility and reveal your final quote.
Enter your basic information to receive your initial quote and determine the face amount and length of coverage right for you.
Pay by credit, debit
or Apple Pay
®
, sign
and done!
Complete the three application sections.
Meet Rashida
* Teacher
* Married homeowner
* Earns $55,000/year
Rashida is working with her Equitable Advisor to plan for retirement. She needs to protect her family and her retirement investment, but has concerns if she can afford it. Given the family's income, their existing mortgage and her retirement goals, her financial professional recommends a $500,000 life insurance policy.
Fast
Affordable
Flexible
With Term-in-10sm, Rashida can get $500,000 in term coverage in just 10 minutes.
Her policy will cover her for 20 years and costs only $26.08/month.
Within the first 10 years, she can convert her policy to any of Equitable's permanent policies if her needs change. 3
Life Insurance: • Is Not a Deposit of Any Bank • Is Not FDIC Insured • Is Not Insured by Any Federal Government Agency • Is Not Guaranteed by Any Bank or Savings Association • Variable Life Insurance May Go Down in Value
You might think the life insurance process takes too long, requires a medical exam or costs too much. But none of those things are true with Equitable Term-in-10sm.
Make a smart choice. Get the coverage you need — fast.
Featuring an all-digital, noninvasive experience, Term-in-10sm is simple, flexible life insurance for people who want protection in just 10 minutes or less.
To learn more, contact your financial professional or visit equitable.com.
1 LIMRA 2020 Insurance Barometer Study.
2 Other comparable products that are fully underwritten may be available at a reduced premium.
3 Twenty-year term provides a 10-year conversion privilege, 15-year term provides a 7-year conversion privilege and 10-year term provides a 5-year conversion privilege.
A life insurance policy is backed solely by the claims-paying ability of the issuing life insurance company. It is not backed by the broker/dealer or insurance agency through which the life insurance policy is purchased or by any affiliates of those entities, and none makes any representations or guarantees regarding the claims-paying ability of the issuing life insurance company.
Term life insurance is issued by Equitable Financial Life Insurance Company, NY, NY and is distributed by Equitable Network, LLC (Equitable Network Insurance Agency of California in CA; Equitable Network Insurance Agency of Utah in UT; Equitable Network of Puerto Rico, Inc. in PR) and Equitable Distributors, LLC, NY, NY.
Term-in-10 SM may not be available in all jurisdictions. Some states may vary the terms and conditions.
References to Equitable in this brochure represent both Equitable Financial Life Insurance Company and Equitable Financial Life Insurance Company of America, which are affiliated companies. Overall, Equitable is the brand name of the retirement and protection subsidiaries of Equitable Holdings, Inc., including Equitable Financial Life Insurance Company (NY, NY); Equitable Financial Life Insurance Company of America, an AZ stock company with main administrative headquarters in Jersey City, NJ; and Equitable Distributors, LLC. Equitable Advisors is the brand name of Equitable Advisors, LLC (member FINRA, SIPC) (Equitable Financial Advisors in MI & TN).
© 2022 Equitable Holdings, Inc. All rights reserved. GE-3629057.1 (3/22) (Exp. 3/24) | G1662201 | Cat. #164205 (3/22)
|
<urn:uuid:65a773c9-0c00-41c4-bc3a-2136365b5074>
|
CC-MAIN-2023-14
|
https://portal.equitable.com/appentry/EDoxRedirect?node_id=A2021111900002
|
2023-03-28T08:05:56+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-14/subset=warc/part-00113-39c03058-7d78-443d-9984-102329513e3d.c000.gz.parquet
| 531,746,073
| 999
|
eng_Latn
|
eng_Latn
| 0.984428
|
eng_Latn
| 0.995075
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2420,
4612
] |
Transphobia And International Day Against Homophobia Transphobia And
Right here, we have countless book international day against homophobia transphobia and and collections to check out. We additionally manage to pay for variant types and also type of the books to browse. The welcome book, fiction, history, novel, scientific research, as skillfully as various supplementary sorts of books are readily understandable here.
As this international day against homophobia transphobia and, it
Transphobia And ends up bodily one of the favored books international day against homophobia transphobia and collections that we have. This is why you remain in the best website to look the unbelievable ebook to have.
International Day Against Homophobia, Transphobia, and Biphobia 2020 | Your Morning International Day Against Homophobia, Transphobia and Biphobia 2020 International Day Against Homophobia, Transphobia, and Biphobia International Day Against Homophobia, Biphobia and Transphobia (IDAHOBIT) International Day Against Homophobia, Transphobia and Biphobia International Day
Transphobia And against Homophobia, Transphobia and Biphobia Marking IDAHOBIT Day 2019 Tani Anakak on International Day against Homophobia IDAHOBIT Day 2020 - Advice on Dealing with Homophobia, Biphobia and Transphobia Celebrate \"IDAHO\" May 17th PSA - The International Day Against Homophobia \u0026 Transphobia Celebrating International Day Against Homophobia, Biphobia and Transphobia Justice and Protection for All on the International Day Against Homophobia, Transphobia and Biphobia Dear My Year 7 Self - Straight People Against Homophobia How Homophobia Sounds to Normal People Rainbow flashmob 2016 on 17
Transphobia And May - International Day Against Homophobia and Transphobia Homophobia and Transphobia Hurts Everyone
The UN and the Fight against Homophobia \u0026 Transphobia IDAHOBIT 2018: 'I'm an LGBTIQ ally because ...' The Riddle: new anti-homophobia message from UN human rights office
17 May 2020 is IDAHOBIT:
'Breaking the Silence' Faces -
United Nations Free \u0026 Equal
International Day Against Homophobia Part 1 International Day Against Homophobia, Transphobia \u0026 Biphobia International Day Against Homophobia
LGBT homeless youth: IDAHOT
Storytime with Miss Roxee
International Day Against
Transphobia And Homophobia and Transphobia(IDAHOT) 2017
IDAHOBIT Book Tag Feature Shelf #27: The Homophobia and Transphobia Awareness Edition International Day Against Homophobia Transphobia The International Day Against Homophobia, Transphobia and Biphobia is observed on May 17 and aims to coordinate international events that raise awareness of LGBT rights violations and stimulate interest in LGBT rights work worldwide. By 2016, the commemorations had taken place in 132 countries across the globe. The founders of the International Day Against Homophobia, as it was originally known, established the IDAHO Committee to coordinate grassTransphobia And roots actions in different countries, to promote
International Day Against Homophobia, Transphobia and ... The International Day Against Homophobia, Biphobia and Transphobia (IDAHOBIT) is a day to celebrate diversity and to raise awareness of the human rights of lesbian, gay, bisexual, transgender, and intersex (LGBTIQ+) people. This year's theme, "Breaking the Silence", is more appropriate than ever. LGBTIQ+ people still face serious challenges in their everyday life.
International Day Against Homophobia, Biphobia and Transphobia The 17th of May marks the Page 6/16
Transphobia And International Day Against Homophobia, Transphobia and Biphobia.
International Day Against Homophobia,Transphobia and ... The International Day Against Homophobia, Transphobia and Biphobia was created in 2004 to draw the attention to the violence and discrimination experienced by lesbian, gay, bisexuals, transgender, intersex people and all other people with diverse sexual orientations, gender identities or expressions, and sex characteristics.
International Day Against Homophobia, Transphobia and ... Each year, 17 May is International Day Against Homophobia,
Transphobia And Biphobia and Transphobia. 2020 is the Civil Service Year of Inclusion. Inclusion can be defined as having a sense of belonging, being your authentic self, and having a voice in your organisation.
International Day Against Homophobia, Biphobia and ... "On this International Day Against Homophobia, Transphobia, and Biphobia, Canada stands with members of the LGBTQ2 communities, at home and abroad, to reaffirm their fundamental right to be treated equally, and with dignity and respect.
Statement on International Day
Against Homophobia ... Page 8/16
Transphobia And International Day Against Homophobia, Transphobia and Biphobia A worldwide Celebration of Sexual and Gender Diversities, May 17 On May 17, 1990, the World Health Assembly of the World Health Organization approved the International Statistical Classification of Diseases and Related Health Problems (ICD 10), which no longer listed homosexuality as a diagnosis.
International Day Against Homophobia, Transphobia and ... The International Day Against Homophobia, Transphobia and Biphobia commemorates this population as well as providing an awareness platform. 70 countries in the world criminalize same-sex
Transphobia And relationships with 6 incorporating the death penalty into it. Brunei enacted an Islamic law making the stoning of LGBTI citizens to death legal.
LGBTI - International Day Against Homophobia, Transphobia ... Press Statement on International Day Against Homophobia Ha Noi, 17 May 2012 – On the occasion of the International Day Against Homophobia and Transphobia (IDAHO), UNAIDS stands together with our gay, lesbian, bisexual and transgender friends to celebrate diversity and to speak out against discrimination and violence.. The growing number of IDAHO events held in Viet Nam each year is an ...
Transphobia And Press Statement on International Day Against Homophobia ... INTERPHOBIA &. TRANSPHOBIA. MAY 17. ABOUT MAY 17. AT HOME. SCHOOLS / UNIS. WORKPLACES. Join 1000s of workplaces, schools and organisations in Australia by going rainbow on May 17 - and make the world a better place for LGBTIQ people. VIEW PRIDE PACKS.
Home - IDAHOBIT - May 17 The theme of this International Day Against Homophobia, Biphobia, Interphobia and Transphobia – break the silence – calls our attention to these inequalities across the world and asks us to speak out together against the discrimination,
Page 11/16
Transphobia And restrictions on basic freedoms, and hate that LGBTQI+ people face in the current context and beyond.
UN Women statement for the International Day Against ... The International Day Against Homophobia, Transphobia and Biphobia is held every May 17.
International Day Against Homophobia, Transphobia and ... May 17 is the International Day Against Homophobia, Transphobia, and Biphobia. JR of the Rainbow Elders To best support our loved ones and neighbors who are lesbian, gay, bisexual, or transsexual (LGBT) on this day and every day, we must first have an understanding
Transphobia And of these words. To begin, we need to have an understanding of the word phobia.
Understanding Homophobia, Biphobia, and Transphobia Therefore, we must take the International Day Against Homophobia, Transphobia and Biphobia (IDAHOT) as an opportunity to raise awareness of the human rights of LGBTI people. It is also a chance to celebrate our diversity.
International Day against Homophobia, Transphobia and ... As we mark International Day Against Homophobia, Transphobia and Biphobia, this virtual issue, curated by Dr. Tonia Poteat of the University of North
Transphobia And Carolina and Dr. Stefan Baral of the Johns Hopkins School of Public Health, reminds us that stigma, discrimination, human rights abuses and the criminalization of people based on their sexuality and gender identities continue to hinder efforts to make social and health services available to people who need them.
International Day Against Homophobia, Transphobia and ... The World Bank commemorates the International Day Against Homophobia, Transphobia, and Biphobia (IDAHOT) annually, on May 17. IDAHOT is the main LGBTI-focused day marked by the international community. This year's IDAHOT activities at the World Bank center around the
Transphobia And 2019 theme of " justice and protection for all.
IDAHOT 2019: International Day Against Homophobia ... Joe Biden May 17 · 2 min read Today, on the International Day Against Homophobia, Transphobia and Biphobia, I stand with LGBTQ+ pe o ple and their allies around the world to celebrate and champion...
Statement by Vice President Joe Biden in Honor of the ... International Day of Persons with Disabilities Michael R. Pompeo December 2, 2020. Press Statement. Designation of Lucio Rodriguez Serrano under the Foreign Narcotics Kingpin Designation Act Michael R.
Page 15/16
Copyright : cohasset.m.wickedlocal.com
Get Free International Day Against Homophobia
Transphobia And Pompeo December 2, 2020. Press Statement. The United States Welcomes Major Milestone in Afghanistan Peace Negotiations
Copyright code : 242c1c6d2ff0e0 db1a06eed567ca9714
|
<urn:uuid:4fc698e6-12f0-41b1-980e-e684a5b69c05>
|
CC-MAIN-2021-43
|
http://cohasset.m.wickedlocal.com/cgi-bin/content/view.php?data=international_day_against_homophobia_transphobia_and&filetype=pdf&id=242c1c6d2ff0e0db1a06eed567ca9714
|
2021-10-18T22:35:51+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00158-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 16,053,222
| 2,031
|
eng_Latn
|
eng_Latn
| 0.912305
|
eng_Latn
| 0.960038
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
490,
1081,
1696,
2314,
2959,
3548,
4132,
4704,
5328,
5945,
6549,
7139,
7719,
8377,
8970,
9245
] |
REGRET TO ANNOUNCE AMBROSE SWASEY PASSED AWAY AT EXETER NEWHAMPSHIRE TUESDAY EVENING FUNERAL CLEVELAND FRIDAY AND EXETER SATURDAY AFTERNOON=
THE WARNER & SWASEY CO.
Mr. Morris
Mr. Henninger
Noted Jun 6/17/37
Noted OS - 6/18/37
Honorary Member AIEE 1928
5701 Carnegie Ave
THERE IS NO DEPENDABLE SUBSTITUTE FOR WESTERN UNION TIME
June 16, 1937
The Warner & Swasey Company
5701 Carnegie Avenue
Cleveland, Ohio
Gentlemen:
We were very sorry indeed to learn of the death of Dr. Ambrose Swasey, but appreciate your telegram of the 16th.
Through his highly important contributions to the advancement of science and its applications, Dr. Swasey achieved a place of outstanding prominence among engineers and others. His long and successful career will ever be a strong incentive to young men looking forward to the opportunity to render real services in connection with the modern applications of science.
We extend to his family and his company associates our keenest regret and most sincere sympathy.
Very truly yours,
National Secretary
HHH: LMW
THE WARNER & SWASEY COMPANY
ACKNOWLEDGES WITH GRATEFUL APPRECIATION
YOUR EXPRESSION OF SYMPATHY
UPON THE DEATH OF
DR. AMBROSE SWASEY
|
<urn:uuid:da597ef4-57d0-423d-9326-97d44eee7a00>
|
CC-MAIN-2024-10
|
https://ethw.org/w/images/a/a1/Swasey_-_correspondence_regarding_death_of_swasey.pdf
|
2024-02-22T23:06:05+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-10/subset=warc/part-00253-d9675c6d-5c8d-45bb-9c98-c56e42022a4d.c000.gz.parquet
| 232,123,695
| 313
|
eng_Latn
|
eng_Latn
| 0.645222
|
eng_Latn
| 0.974326
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
331,
1053,
1191
] |
WALK 1: Wilford Village
Photos and description: 2020-24
Take the Nottingham to Clifton NET tram line to the Meadows Embankment Tramstop (at the southern end of Queen’s Walk, just north of Wilford Toll Bridge)
The walk, through and around Wilford Village (1), is about 5.7km (3½ miles) and the description includes directions and a note of interesting sites along the way. For some of these sites, marked with a red number on the maps, there is further information in the 1A. Wilford Village Appendix.
From the tramstop look north, and there is an interesting view along Queen’s Walk to Nottingham Station with the tower of St Mary’s Church (Lace Market).
Turn around and walk to Wilford Bridge (2).
As you cross the bridge, look along the river for any boating activity.
On the left (downstream) side, you can see the remains of the support for the Great Central Railway bridge that used to cross the river (see later).
Continue along towards Wilford and on your left is Iremonger Pond, which we will return to later in the walk. On your right is the Ferryfields ground of the Nottm. Moderns RFC (3), with the clubhouse at the far end.
Continue ahead, alongside the tramway, until it turns left alongside Coronation Avenue when you should keep straight on towards the Ferry Inn, past, on the left, a small car park which was built as part of the tram works.
Hidden under the car park is a surface water run-off reservoir for use when the Trent is in flood – it comprises a honeycomb of hundreds of plastic moulds, like huge egg boxes piled 6 or 7 deep.
Behind the trees, on Coronation Avenue, is St Patrick’s School (4).
Turn right in front of the Ferry Inn (5) and continue along the path ahead – Rectory Drive.
Continue through to the church grounds and go around to the right of the church, past the Wilford Gazebo (6) at the corner.
Go across to the side of the church and look up to see the carving above the downpipes.
Continue round to the front of St Wilfrid’s Church (7) and, to the right of this picture, look for the grave of Captain John Deane (8).
Go out of the churchyard – to your immediate right is a path leading to a set of steps which used to lead to a ford across the river. We go into Church Green and bear left around the green and past, behind the tall gateway to your left, the Old Rectory (9). Next you pass the dovecote, the tithe barn and (off the photo) the St Wilfrids New Rectory and the Benjamin Carter Church Hall.
Continue out to Wilford Village Green, traditionally referred to as the ‘lower green’, with its grand trees, planted to commemorate the Golden Jubilee of Queen Victoria in 1887. Go left along Glebe Cottage Walk beside the Glebe Cottages (10).
Just beyond the Glebe cottages, is 125 Main Road, a small, low building. It used to have many quirky items in the front garden .... I particularly liked this one, which was on the fence. Sadly, there is nothing there now.
Turn right along Main Road and on your right is Manor House Close, a development on the site of the old Manor House.
Just beyond this Close is the only remaining property of a row of cottages – Manor House & Main Road Cottages (11).
On the other side of Main Road are the Dorothy Boot Homes (12).
Continue along Main Road and bear right through the iron railings to what is known as Bee Bank (13) – with views over the river towards what was the site of Clifton Colliery (14) and North Wilford Power Station.
On the left of Main Road is The Carter House (15) and behind it the South Wilford Primary School.
Where the Bee Bank path splits, take the right fork, alongside the river.
Where the path forks again, turn left into Bells Lane, where there is new development on what was the site of the Wilford Social and Bowls Club (16).
Turn right, back onto Main Road, and on your left, before Leander Close, is a bungalow (36 Main Road) known as the Dame School (17).
Diagonally opposite and a few yards further on is Hunters Farm, a timber-framed Grade II Listed farmhouse built in 1724 for the Hunter family who farmed the surrounding fields.
Cross the main road and go right on Clifton Lane. On the opposite (north) side is the Harvester restaurant (19)
And on the near side is Wilford House, formerly known as Wilford Hall (20).
Continue to the end of Main Road at its junction with Ruddington Lane, Wilford Lane, Clifton Lane – Wilford Crossroads and Green (18).
From Clifton Lane turn left into Dean Road. This is Wilford Place (21), a residential estate built in 2006 on part of the grounds of Wilford House. Turn right and then left into Ferryman Road. At the green, turn left along Halfpenny Walk, with Claypit Walk on the other side.
At the end of Halfpenny Walk there is a view of the rear of Wilford House.
Turn right and then turn left onto Ruddington Lane.
Turn right into Pinfold Lane (see 18), go past the Co-op and then the Taylors Arms (formerly the Maypole from 1966) and then along Wilford Lane to the tram crossing.
Cross the tram tracks and turn left, alongside the tram route. Just beyond this point is the Wilford Retail Park, which used to be the site of Bernie Inn ‘The Chateau’ and before that Wilford Cottage (22).
The tram route at this point runs alongside the embankment on which ran the Great Central Railway (23). Go along the path for about 400m, past The Becket School (24), and then turn right on the public footpath alongside the Gresham Playing Fields, and between hedges...
...across Gresham Park Road and into the path and boardwalk through Gresham Marsh.
When you reach the flood embankment path and wall, turn left, alongside the Trent.
Continue along the path, with The Nottingham Emmanuel School (25) on your left...
...and the tram route to Clifton passes the playing fields.
Where the path slopes down towards the tram tracks, bear right, across the grass... ...and down the slope to the right.
Go past the small pond on your left – The Swales (26).
Continue around this pond to meet with the path around the Iremonger Pond (27) – turn right.
The tree covered embankment on your right is the old alignment of the Great Central Railway (23) as it approached the bridge (demolished in 1985) over the Trent.
Continue past the northern end of the pond...
...around to the left, over a bridge and left again, then...
...along between the other side of the pond and, on your right, a small orchard – Wilford Community Orchard (28).
At the flood protection wall turn right, up to the tram route and the Wilford Village tramstop – the end of this walk.
|
49430201-5225-4bf7-8452-86a5b362c9bc
|
CC-MAIN-2024-38
|
https://www.transportnottingham.com/wp-content/uploads/2024/08/1.Wilford-Village-Walk.pdf
|
2024-09-08T20:41:06+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-38/subset=warc/part-00094-781f89b0-54ef-4e32-b51d-e5860e733e3a.c000.gz.parquet
| 1,004,873,263
| 1,531
|
eng_Latn
|
eng_Latn
| 0.995638
|
eng_Latn
| 0.997464
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
503,
1724,
2706,
3616,
4405,
5185,
5624,
6202,
6546
] |
Application for a Registration Certificate
To be used by European Economic Area (EEA) or Swiss nationals residing in the UK and their EEA or Swiss national family members.
It is not mandatory to complete this application form. However it will assist in dealing with your application more efficiently if this form is used. Please read the guidance notes at the front of this form before making your application.
Please note there is a fee of £55 for each person applying for a registration certificate. You must pay this fee even if you choose not to use this application form. If you do not pay the fee, your application will be rejected. For further information, see the payment guidance notes on pages 2 to 3 and then complete Section A.
Our application forms change periodically. If you obtain this form some time before applying, please check that it is still the version which must be used when you are ready to apply.
For information about other EEA forms, see part 14 of the guidance notes.
Applications on this form may be made by post or in person at our Croydon Premium Service Centre. To apply in person, you must book an appointment in advance with Croydon PSC. You can do so online at: https://www.gov.uk/ukvipremium-service-centres/book-an-appointment
If you apply by post you must send your application to the following address:
Home Office – EEA Applications
PO Box 590
Durham
DH99 1AD
WORKING TOGETHER TO PROTECT THE PUBLIC
EEA1 Version 06/2014 - Page 1 of 37
CERTIFICATE
Version 06/2014
This form is to be used for applications made on or after 2 June 2014
PAYMENT GUIDANCE
The Fee
There is a fee of £55 for this application.
For each family member applying with you, the fee increases by £55.
Please note that your application will be rejected as invalid if you do not pay the specified fee.
How you can pay
You can pay by any of the following methods:
* Cheque/Bankers Draft
* Postal Order
* Credit card - Mastercard, Visa (including Electron) or American Express (Amex)
* Debit card - Delta, Maestro* (including Solo)
* Maestro - We can accept only Maestro cards issued in the UK.
Please note that when making large or multiple payments using your credit card, the anti-fraud meas ures that banks operate sometimes stop the full payment being taken. This can happen for a number of reasons. To prevent this you may inform your bank of your intention to make large or multiple payments in advance so that your bank allows the full payment to be taken when you submit your application. Please be aware that not all banks offer this service.
Cheques and postal orders
You must make the cheque or postal order payable to 'Home Office' and cross the cheque or postal order A/C Payee only. Please write the full name and date of birth of the applicant on the back of the cheque and/or each postal order and keep the postal order receipt(s). Please make sure that the date and the amount (words and figures) are correct and that the cheque is signed properly. Attach your cheque or postal order(s) to the front of the application form.
Completing the payment details page
To ensure that your payment is processed without any delay, please follow this guidance when completing Section A of this form (Payment Details).
EEA1 Version 06/2014 - Page 2 of 37
FORM EEA1: GUIDANCE NOTES
A1 Tick the fee appropriate to your application - see above guidance. If you do not select a fee then we cannot take a payment and your application will be rejected as invalid.
A2-A3 If the address for correspondence is different from your home address in the UK, please give that address at A2. If a solicitor or other authorised immigration adviser is submitting the application, it should be their address at A2 and their name at A3. These details will also be used to acknowledge receipt of the application.
A4 Applicant's full name, as given in his or her passport or travel document.
A5 Applicant's date of birth
Method of payment
A6 Tick one of the boxes to show which method of payment you are using
A7 - A9 If paying by cheque or bankers draft enter the bank account number, sort code and cheque number
Paying by credit / debit card
A10 The name as displayed on the credit/debit card
A11 Card number - this is the long number across the centre of the card
A12-A14 Enter the details where available on the card
A15 The Card Verification Value (CVV) is a 3-digit security code found on the back of the card on the signature strip - it consists of the last 3 digits. For Amex the security code consists of 4-digits and is found on the front of the card.
If you do not provide the CVV number, we cannot take your payment and your application will be rejected as invalid.
A16-A17 Cardholder's signature - the person named on the credit/debit card must sign and date these sections.
Consideration process
* If the payment submitted does not cover the full cost of your application, it will be an invalid application and the form, together with any documentation submitted, will be returned to you.
* The fee charged is for the processing and consideration of the application. This fee will be payable once the application form is received by the Home Office or its payment processing agent, regardless of the outcome of the application.
* We cannot begin the consideration process until the payment has cleared. We allow 5 working days for payments made by cheque to clear, credit/debit cards and postal orders will clear immediately.
EEA1 Version 06/2014 - Page 3 of 37
If you are producing a double-sided copy of this application form, please include this page and make sure it falls on the reverse of the payment details page in the two-sided copy.
For administrative reasons, it is important that the rest of the form begins with Section A - Applicant's Details facing upwards
EEA1 Version 06/2014 - Page 4 of 37
SECTION A - PAYMENT DETAILS EEA1
Please complete this section in block capitals and black ink.
Applicants should refer to the Payment Guidance Notes which accompany this application form.
A. Application Details
A1. Tick the applicable boxes and fee. If no fee is ticked we cannot take a payment and your application will be rejected as invalid:
Single applicant - no family members
£55
Main applicant and two family members
£165
Main applicant and one family member
£110
Main applicant and three family members
£220
If more than 3 family members are applying with you, please state the number in the space below and enter the correct amount specified in the payment guidance in the box.
Main applicant and ............... family members
£
A2. Contact Address in the UK for correspondence
Postcode
A3. Contact Name in the UK if different from that of the applicant
A4. Applicant's Full Name
A5. Applicant's date of birth (dd/mm/yyyy)
A6. Please select the method of payment from the list below:
United Kingdom postal order (payable to 'Home Office')
Cheque/bankers draft (payable to 'Home Office') - go to question A7
Visa/Mastercard/Amex - go to question A10
Delta / Maestro - go to question A10
A7. Account number
A8. Sort code
A9. Cheque number
A10. Please debit the following account: Name on card
A11. Card number (the long number across the centre of the card)
A12. Valid from A13. Expiry date A14. Issue number
A15.CVV security number
(where
available)
(3 digit number or 4 digit number for Amex)
A16. Cardholder's signature
A17. Date dd/mm/yyyy
EEA1 Version 06/2014 - Page 5 of 37
Blank page
EEA1 Version 06/2014 - Page 6 of 37
There is no legal requirement for EEA or Swiss nationals exercising Treaty rights in the UK, or their EEA or Swiss family members, to obtain a registration certificate to confirm their right of residence in the UK. Any such EEA or Swiss national applying for a registration certificate does so on an entirely voluntary basis. If you are the EEA or Swiss extended family member of an EEA or Swiss national, and you do not have a right to reside on any other basis, you must apply for a registration certificate to have a right of residence.
1. WHO CAN APPLY ON THIS FORM
EEA or Swiss nationals exercising Treaty rights in the UK can apply for a registration certificate on this form. You may include your family members in the application if they are EEA or Swiss nationals. See part 13 of these notes for information about Treaty rights.
Although Switzerland is not a member state of the EEA the agreement between the European Community, its member states and the Swiss Confederation on the free movement of persons gives similar rights of residence to Swiss nationals and their family members. Any further reference on this form to EEA nationals includes Swiss nationals.
You and any family members included in the application must be in the UK to apply.
2. RELEVANT UK LEGISLATION
The relevant legislation for applications on this form is the Immigration (European Economic Area) Regulations 2006 (as amended). You can find these Regulations on the following website:
www.legislation.gov.uk
3. WHEN TO APPLY
You may apply at any time during your stay in the UK.
4. ENSURING YOUR APPLICATION IS COMPLETE
Your application could be delayed if it is incomplete. To avoid that, please ensure that you do the following:
* apply on the current version of form EEA1
* provide photographs of yourself and any family members applying with you in the format specified in the separate Home Office guidance, see: https://www.gov.uk/photos-for-passports
* provide all relevant documents specified in the form
* complete every section of the form as required.
We reserve the right to decide your application on the basis of the information and documents provided. It is important, therefore, to provide an explanation if you cannot give us all relevant information or documents when making your application.
Depending on the facts of each case and where appropriate, the Home Office may make an unannounced home visit. Equally, the Home Office may prosecute the appropriate party if evidence of deception is discovered related to this application.
5. COMPLETING THE FORM
Please use a black pen to complete the form, and write names, addresses, and similar details in capital letters.
EEA1 Version 06/2014 - Page 7 of 37
In the applicant's details and other sections where you give personal details and addresses, leave an empty box between each name and each part of the address.
Please note that we always use the personal details in an applicant's passport or identity card for official purposes, including any registration certificate issued if the application is successful.
Take care to complete all sections as required. You must enclose a letter of explanation if you are unable to complete any part of the form because you do not have the required information.
6. PHOTOGRAPHS
You must provide the following photographs:
* Two identical passport-size colour photographs of yourself with your full name written on the back of each one.
* Two identical passport-size colour photographs of any family members applying with you with their full name written on the back of each one.
* The photographs you provide must be in the format specified in the separate photograph guidance.
Please ensure that you place the photographs in a small sealed envelope attached to section 1 of the form as instructed there – and without any staples, clips, pins or anything else which could mark the photographs.
The photograph(s) provided will be reproduced in your and your family members' registration certificate(s) if the application(s) is/are successful.
7. DOCUMENTS
Identity and travel documents provided with the application must be originals and copies will not be accepted.
Copies of other types of document of any kind are not acceptable unless there are valid reasons for not being able to provide the original document. In such circumstances, we may accept a copy certified by the body or authority which issue the original (for example, a copy of a savings book certified by the building society or bank) or by a notary.
The reason for not being able to provide the original document must be explained in a covering letter. We are unlikely to be able to grant your application without the original document where there is no valid reason.
Any documents which are not in English must be accompanied by a reliable English translation.
Make sure passports are signed.
8. APPLYING BY POST – THE ADDRESS
The address to which you must post an application on form EEA1 is:
Home Office
EEA Applications
PO Box 590
Durham
DH99 1AD
EEA1 Version 06/2014 - Page 8 of 37
FORM EEA1: GUIDANCE NOTES
Posting to any other address will delay it.
Please also use this address for any other correspondence about your application.
If you use Recorded or Special Delivery, this will help us to record the receipt of your application. Please make sure that you keep the Recorded or Special Delivery number.
PLEASE NOTE: If you require your valuable documents to be returned to you by secure post you should enclose a pre-paid self-addressed Royal Mail Special Delivery or Recorded Signed For Delivery envelope with your application. The pre-paid self-addressed envelope should be sufficient to accommodate the size and weight of your documents and be insured to the appropriate level for the value of your documents. If this is not enclosed your documents will be returned to you using Royal Mail 2nd class post. Please consult Royal Mail's website at www. royalmail.com for further information.
9. APPLYING IN PERSON
Applications on form EEA1 may be made in person at our Premium Service Centre (PSC) in Croydon but not at any of our other PSCs.
To apply in person you must book an appointment in advance with Croydon PSC. You can do so online at www.gov.uk/ukvi-premium-service-centres. If you make one for some time ahead, please check that the application form you use is still valid on the day of your appointment.
The address of the Croydon PSC is:
Premium Service Centre
Lunar House
40 Wellesley Road
Croydon
CR9 2BY
For up-to-date information on opening times and services, please check the PSC pages on our website.
10. DECISION TIMES
For information on the current processing times for applications for registration certificates on form EEA1, see the 'Service standards' page on the UK Visas and Immigration website:
www.gov.uk/government/organisations/uk-visas-and-immigration/about/about-our-services.
11. CONTACTING US AFTER YOU HAVE APPLIED
If you need to contact us after you have applied, please do so as instructed below.
To send us more information about your application, write to the address in part 8 and give the following details in your letter:
* The applicant's full name, date of birth and nationality.
* Any Recorded or Special Delivery number.
* The date on which the application was posted or made in person.
* The Home Office reference number if you have one.
We generally advise that you should not make any travel plans until we have returned your passport. If you need your passport because you have to travel urgently and unexpectedly, use the return of documents request form at: www.gov.uk/visa-documents-returned
EEA1 Version 06/2014 - Page 9 of 37
FORM EEA1: GUIDANCE NOTES
12. OBTAINING ANOTHER FORM
You can obtain all the EEA application forms via the Visas and Immigration website:
https://www.gov.uk/visas-immigration
13. YOUR RIGHT TO RESIDE IN THE UK
EEA nationals have a right to reside in the UK for longer than 3 months if they are exercising a Treaty right in one of the following ways:
* Worker
* Self-employed
* Student
* Economically self-sufficient (including retired people)
* Jobseeker
* temporarily incapacitated
The following nationals may exercise Treaty rights in the UK:
Austria
Belgium
Bulgaria
Croatia***
Cyprus*
Czech Republic
Denmark
Estonia**
Finland
France
Germany
Greece
Hungary
Iceland
Irish Republic
Italy
Latvia**
Liechtenstein
Lithuania**
Luxembourg
Malta
Netherlands
Norway
Poland
Portugal
Romania
Slovakia
Slovenia
Spain
Sweden
Switzerland (but see part 1 of these notes)
* A document issued by the Turkish Republic of Northern Cyprus does not establish that the person is an EEA national. Only a document issued by the Republic of Cyprus stating that the holder is a national of the Republic of Cyprus establishes that the person is an EEA national and accordingly entitled to free movement within the European Union (EU).
** Alien passports are issued to persons of Russian origin who moved to the Baltic States, Estonia, Latvia and Lithuania, when they were part of the former Soviet Union. They are not regarded as being citizens and therefore the Estonian, Lithuanian, and Latvian authorities issue them with alien passports.
Although they look very similar, alien passports are not proof of EEA nationality.
*** Croatia joined the EU on 1 July 2013. Guidance and application forms for Croatian nationals can be found at: https://www.gov.uk/croatian-national
14. OTHER EEA FORMS
The other EEA forms are:
* EEA2 for residence card applications by non-EEA national family members of EEA nationals.
* EEA3 for permanent residence applications by EEA nationals and their EEA national family members.
* EEA4 for permanent residence applications by non-EEA national family members of EEA nationals.
* DRF1 for derivative residence card applications by people who do not have a right to reside under the Free Movement Directive but have a derivative right of residence in the UK. For further information, see https://www.gov.uk/derivative-right-residence
15. CHOOSING AN IMMIGRATION ADVISER
If you use the services of an immigration adviser, take care when choosing one. The Office of the Immigration Services Commissioner (OISC) regulates immigration advisers.
Their website at www.oisc.gov.uk contains a list of authorised advisers. It also has links to websites for solicitors, barristers and legal executives.
If you have a complaint about an immigration adviser or need other information, the OISC contact details are:
Office of the Immigration Services Commissioner
5th Floor
Counting House
53 Tooley Street
London
SE1 2QN
Telephone: 0845 000 0046
Alternatively the Solicitors Regulation Authority, which regulates solicitors in England and Wales, can help you find a solicitor if you contact them on 0870 606 2555 or visit their website at www.sra.org.uk.
The address and telephone number for any complaints about a solicitor are:
Legal Complaints Service
Victoria Court
8 Dormier Place
Leamington Spa
Warwickshire
CV32 5AE
Telephone: 0845 608 6565
16. COMPLAINTS ABOUT OUR SERVICE
If you wish to make a complaint about our service, please refer to the complaints page on our website for detailed information about how to do so.
17. DATA PROTECTION NOTICE
We will treat all information provided by you in confidence but may disclose it to other government departments, agencies, local authorities, the police, foreign governments and other bodies for immigration purposes or to enable them to carry out their functions.
We may also use the information provided by you for training purposes.
SECTION 1 – APPLICANT'S DETAILS
Please tick this box only if you are applying as the family member of an EEA national who is exercising Treaty rights in the UK but that EEA national is not applying for a registration certificate at this time. Please complete section 1 and 2 with your details and those of any EEA family members also applying on this form. Complete section 3 with details of the EEA national family member who is or was exercising Treaty rights in the UK, and then section 4 to 9 as appropriate.
1.1 Your title – please tick
Mr
Mrs Miss
Ms
Other
1.2 If other, what is your title?
Photographs
You must provide two identical photographs of yourself with your full name on the back of each one. Please place the photographs in a small sealed envelope, together with those of any family members included in section 2, and attach it across this space with a staple or paper clip at the right-hand side of the page/envelope.
Please make sure that the staple or paper clip does not damage or mark the photographs. All photographs must be as specified in the separate photograph guidance.
1.3 Your gender – please tick
Male
Female
1.4 Your date of birth
day month year
1.5 Your full name as in your passport or ID card
1.6 Your surname or family name as in your passport or ID card
1.7 Any other name(s) by which you have been known
1.8 Nationality
1.9 Do you also hold British citizenship
Yes
No
SECTION 1 – APPLICANT'S DETAILS (continued)
1.10 Place of birth – town or city and country
1.11 Passport or travel document number
1.12 Home Office reference (if applicable)
1.13 Your UK address – please inform us if this changes
Postcode
1.14 Your daytime telephone number
1.15 Your mobile telephone number
1.16 Your email address if you have one. We may use your email address to communicate with you about the status of your application. Please write your email address clearly in block capitals and note that we can only send updates to the email address you provide
1.17 Please re-enter your email address in block capitals in the box below
1.18 Name and address in the UK for all correspondence about your application if different from 1.13
Postcode
1.19 if you completed 1.18 and the address is that of your immigration adviser, please state their Office of the Immigration Services Commissioner (OISC number)
SECTION 2 – FAMILY MEMBERS INCLUDED IN YOUR APPLICATION
Please give details below of any EEA national family members included in the application. If more than 3 family members are applying, please give their details on a photocopy of this page, enclose it with the form, and place the photographs in the envelope attached to section 1 as instructed there. Non-EEA national family members wishing to apply for a residence card should complete form EEA2.
If the family member is your child, please provide documentary evidence of the relationship (e.g. full birth certificate), if your details are not shown in the child's passport or ID card.
If the family member is a relative other than a child (e.g. parent, brother, sister, cousin), please provide appropriate documentary evidence to confirm the relationship (e.g. full birth, marriage or civil partnership certificates).
Photographs You must provide two identical pho tographs of each family member who is applying. Write the family member's full name on the back of each photograph and enclose both photographs in the envelope attached to section 1 as instructed there.
2.1 Family member's full name
2.2 Nationality
2.3 Date of birth
2.4 Gender please tick
2.5 Relationship to you - please specify
day month year
male female
2.6 Home Office reference (if applicable)
Photographs You must provide two identical pho tographs of each family member who is applying. Write the family member's full name on the back of each photograph and enclose both photographs in the envelope attached to section 1 as instructed there.
2.7 Family member's full name
2.8 Nationality
2.9 Date of birth
2.10 Gender - please tick
2.11 Relationship to you - please specify
day month year
male female
2.12 Home Office reference (if applicable)
Photographs You must provide two identical pho tographs of each family member who is applying. Write the family member's full name on the back of each photograph and enclose both photographs in the envelope attached to section 1 as instructed there.
2.13 Family member's full name
2.14 Nationality
2.15 Date of birth day month
2.16 Gender - please tick
2.17 Relationship to you - please specify
year
male female
2.18 Home Office reference (if applicable)
SECTION 3 – YOUR EEA NATIONAL FAMILY MEMBER WHO IS EXERCISING TREATY RIGHTS
Note 1. There is no requirement for your EEA national family member who is exercising Treaty rights in the UK to apply for a registration certificate and we can decide your case without them applying. However, we must receive evidence of their identity, e.g. passport or identity card. If your EEA national family member wishes to apply for a registration certificate, their details must be entered in section 1 and your details in section 2.
3.1 Their title – please tick
Mr Mrs Miss
Ms Other
3.2 If other, what is their title?
3.3 Their full name as in their passport or ID card
3.4 Any other name(s) by which they are or have been known
3.5 Their Nationality
3.6 Do they also hold British citizenship?
Yes
No
3.7 Their date of birth
3.8 Their gender – please tick
day month year
male
female
3.9 Home Office reference - if applicable
3.10 Their Passport, ID card or registration certifi cate number
3.11 Their UK address – please inform us if this changes
Postcode
3.12 Their daytime telephone number
3.13 Their mobile telephone number
3.14 Evidence of relationship: birth certificate/marriage certificate/civil partnership certificate/evi dence of durable relationship/other evidence of relationship (please circle to indicate).
Note 2. If you are applying for a registration certificate because your EEA national family member has died or left the UK please complete section 4. If you are applying for a registration certificate on the basis that your British citizen family member is treated as an EEA national under the judgment in the case of Surinder Singh, please complete section 5.
Please go straight to section 6 for all other applications
Please give the personal details of your EEA national family member who is exercising Treaty rights in the UK, or who has acquired permanent residence in the UK under the Immigration (European Economic Area) Regulations 2006. You must only complete this section if they have chosen not to apply for a registration certificate at this time. If you are applying under the judg ment in the case of Surinder Singh (see section 5), please give your British citizen family mem ber's details in this section.
SECTION 4 - RETAINED RIGHT OF RESIDENCE IN THE UK
You must complete this section if you are applying for a registration certificate because your EEA national family member has died or left the UK. You must also complete section 6, 7, 8 or 9 (whichever is applicable) to show how your EEA national family member was exercising Treaty rights.
4.1 Reason for having a retained right of residence in the UK. Please tick relevant box:
EEA national family member has died (Answer only 4.2 to 4.6)
EEA national has left the UK (Answer only 4.7 to 4.11)
day month year
4.2 Date your EEA national family member died:
4.3 Are you a child or grandchild of the EEA national who has died? If no go to 4.4. If yes, go straight to 4.5
Yes
No
4.4 Are you the parent with custody of a child or grandchild of the EEA national family member who has died?
Yes
No
4.5 Was the child or grandchild attending an educational course immediately before the EEA national family member died and do they continue to attend such a course?
Yes
No
4.6 Please give details in the box below of which educational establishment they are attending. You must also provide evidence of this such as a letter from the school or college. Then go to section 6.
day month year
4.7 Date your EEA national family member left the UK:
4.8 Are you a child or grandchild of the EEA national who has left the UK? If no go to 4.9. If yes, go straight to 4.10
Yes
No
4.9 Are you the parent with custody of a child or grandchild of the EEA national family member who has left the UK?
Yes
No
4.10 Was the child or grandchild attending an educational course immediately before the EEA national family member left the UK and do they continue to attend such a course?
Yes
No
4.11 Please give details in the box below of which educational establishment they are attending. You must also provide evidence of this such as a letter from the school or college. Then go to section 6.
SECTION 5 – SURINDER SINGH CASES (family members of British citizens)
Complete this section if you are applying for a registration certificate under the judgment in the case of Surinder Singh because your British citizen family member has exercised their Treaty rights as a worker or self-employed person in an EEA Member State other than the UK.
You must also complete either section 6 or 7 to show how your British citizen family member was exercising Treaty rights in another EEA Member State.
About the British citizen
5.1 Has your British citizen family member exercised their Treaty rights as a worker or self-employed person in an EEA Member State (other than the UK)?
Yes - as a worker
Yes - as a self-employed person
No - You will not qualify in this category
5.2 What is the EEA Member State (other than the UK) in which your British citizen family member exercised their Treaty rights as a worker or self-employed person?
5.3 Date on which your British citizen family member began their employment or selfemployment in the EEA Member State named above:
day month year
5.4 Date on which your British citizen family member ceased their employment or selfemployment in the EEA Member State named above:
day month year
About you
5.5 How are you related to the British citizen?
Spouse/civil partner
Child or grandchild aged under 21
Dependent child or grandchild aged over 21
Dependent parent or grandparent
Other – please specify
Note 1. You must provide evidence of how you and any family members included in this application are related to the British citizen, such as marriage/civil partnership certificates, birth certificates, etc, and evidence of dependency in the case of children over 21 and parents/ grandparents.
Note 2: If you are the spouse or civil partner of the British citizen, answer questions 5.6 to 5.12 below.
If you are not the spouse or civil partner of the British citizen, answer questions 5.8 to 5.12 below.
In both cases, make sure you provide evidence of the British citizen's employment (section 6) or self-employment (section 7) in the EEA Member State.
If you are the spouse or civil partner of the British citizen:
5.6 Date you married or registered the civil partnership:
day month year
5.7 Did you live with the British citizen while they were exercising Treaty rights in the EEA Member State named above?
Yes
No
Residence in the EEA state
5.8 Please give details of where you, the British citizen, and your family lived while the British citizen was working or self-employed in the EEA state named above. Start with the most recent address. Continue on a separate sheet if necessary.
Please also provide relevant evidence, such as tenancy agreements, leases, mortgage statements, etc. If the accommodation was provided by an employer, friend or relative, please provide a letter from them confirming this, together with proof that you/the British citizen lived at that address (e.g. utility bills in your/their name).
Rented by you/the British
citizen
Provided by employer/friend/
relative
Other - please specify
5.9 Details of any absences by you or the British citizen from the EEA Member State while you/ they were resident there. Continue on a separate sheet if neccessary.
5.10 Date on which the British citizen returned to live in the UK:
day month
year
5.11 If you or any of your family members lived with the British citizen in the EEA state, please confirm the date you/they returned to live in the UK. If not applicable, write 'N/A'.
day month
year
You:
Other family members:
Evidence of integration into the EEA Member State
5.12 Use the box below to provide any other information which you feel demonstrates that the British citizen transferred the centre of their life to the EEA Member State, and provide supporting evidence where possible. This could include things like:
* details of financial commitments in the EEA state (for example, mortgage, rental agreement, bank account, investments)
* evidence of speaking the language of the EEA state
* if you had any children or grandchildren living with you in the EEA state, details of any nursery/school/college/university they attended
* membership of any social groups or sports clubs, etc.
* details of any community activities undertaken in the EEA state
Evidence of your British citizen family member's employment or selfemployment in the EEA state
If your British citizen family member was a worker in the EEA state mentioned above, please complete section 6 with details of their employment and provide the evidence listed in that section.
If your British citizen family member was self-employed in the EEA state mentioned above, please complete section 7 with details of their self-employment and provide the evidence listed in that section.
SECTION 6 - EMPLOYMENT
Complete this section with details of the EEA national's employment if the application is being made on this basis. If you/your EEA national family member has ceased work for any reason, go to section 6A or 6B.
6.1 Full name of employer (i.e business or firm)
6.2 Address of the business where you are/your EEA national family member is employed
Postcode
6.3 Business telephone number
6.4 Employment start date
6.5 Number of hours worked each week
day month
year
6.6 Salary/wages received each month/week
6.7 Expected duration of employment
£ a month/week
(delete as appropriate)
6.8 National Insurance Number if obtained
6.9 Please either ask your (or your EEA national family member's) employer to complete the Employer's declaration at 6.10 - 6.12 below OR please provide at least one of the pieces of evidence listed below in 6.13.
6.10 Employer's declaration
(employee's name) has been employed as a worker in this business in accordance with the details given above.
From
day month year
Employers stamp (if available)
6.11 Signature of employer
6.12 Date
6.13 Evidence of employment. Please provide us with at least one of the following and tick relevant box(es):
Contract(s) of employment
Most recent wage slips (at least one)
Letter(s) from employer confirming your/your EEA national family member's employment. This should be on letter headed paper and signed and dated by the employer.
SECTION 6A – RETAINED STATUS AS A WORKER – (temporary incapacity, seeking work, or vocational training)
Complete this section if the EEA national exercising Treaty rights was previously working in the UK and has retained their status as a worker under European law because they are either: temporarily unable to work due to an illness or accident; involuntarily unemployed and seeking work; or undertaking vocational training after becoming unemployed.
If the EEA national is seeking work but was not previously employed, or does not otherwise qualify to retain their status as a worker, please go to section 6B.
6A.1 Please tick the box below that best describes the EEA national's circumstances.
A. Temporarily unable to work due to an illness or accident (answer questions 6A.2 to 6A.3)
B. Involuntarily unemployed after having worked in the UK and seeking work (answer questions 6A.4 to 6A.8)
C. Unemployed after having worked in the UK and currently undertaking vocational training (answer questions 6A.9 to 6A.10)
A. Temporary incapacity
6A.2 If the EEA national is temporarily unable to work due to an illness or accident, please confirm the date they stopped working for this reason:
day month year
6A.3 Please provide:
Evidence that the EEA national was working in the UK immediately before their illness or accident (such as a letter from the employer), and
Evidence of their temporary incapacity, such as a letter from a doctor confirming the nature of the illness or accident and that the incapacity is not expected to be permanent.
If the incapacity is expected to be permanent, you should consider completing form EEA3 instead.
B. Involuntarily unemployed and seeking work
6A.4 Date the EEA national started their previous employment:
day month year
6A.5 Date the EEA national's previous unemployment ended:
day month year
6A.6 Reason previous employment ended:
6A.7 Is the EEA national registered as unemployed with Jobcentre Plus (or the Social Security Office or Jobs and Benefits Office if living in Northern Ireland)?
Yes
No (you should consider completing section 6B instead)
6A.8 Please provide the following evidence:
Evidence that the EEA national was working in the UK immediately before becoming unemployed, such as a letter from their former employer. This should also state whether they left the job voluntarily or involuntarily.
Evidence that the EEA national has registered as unemployed with Jobcentre Plus (or the Social Security Office or Jobs and Benefits Office if in Northern Ireland).
Evidence that the EEA national is seeking work and has a genuine chance of finding work. This could include:
* copies of job applications
* invitations to interviews
* rejection letters from employers
* proof of registration with a recruitment agency
* proof of receipt of Jobseeker's Allowance or national insurance credits
* evidence of relevant professional, vocational or academic qualifications, or relevant work experience.
Please note that if the EEA national has been unemployed for more than six months, we will only issue a registration certificate if:
* the EEA national was employed for at least one year before becoming unemployed, and
* there is compelling evidence that the EEA national is continuing to seek work and has a genuine chance of finding work.
C. Unemployed and undertaking vocational training
6A.9 Please confirm if the EEA national left their previous job voluntarily or involuntarily:
Voluntarily
Involuntarily
Please provide a letter from the former employer confirming the dates the EEA national worked for them and whether they left the job voluntarily or involuntarily.
6A.10 Please provide a letter from the college or training provider where the EEA national is undertaking their vocational training, confirming:
* the date the EEA national started their training
* the duration of the training course
* the qualification the course leads to (if applicable), and
* if the EEA national left the previous job voluntarily, the letter must also confirm whether the training is related to the previous employment.
SECTION 6B – JOBSEEKER
Complete this section if the EEA national exercising Treaty rights is in the UK seeking work and they were not previously working in the UK or they do not qualify to retain their status as a worker (see section 6A).
6B.1 Please tick the box below which best describes the EEA national's circumstances and answer the relevant questions as indicated. You must also provide evidence that the EEA national is seeking employment – see 6B.6 below.
A. Entered the UK to seek employment and still seeking employment (answer question 6B.2).
B. Previously in the UK as a worker*, self-employed person, student or self-sufficient person and now seeking work (answer questions 6B.3 to 6B.5)
* If the EEA national was previously in the UK as a worker, only complete this section if they do not qualify to retain their status as a worker (see section 6A). This could be, for example, because they left their last job voluntarily or are not registered with Jobcentre Plus (or the Social Security Office or Jobs and Benefits Office if living in Northern Ireland).
A. Entered the UK to seek employment
6B.2 Please confirm the date the EEA national entered the UK to seek employment:
day month year
B. Previously in the UK as a worker, self-employed person, student or self-sufficient person
6B.3 Please confirm the category in which the EEA national was exercising their Treaty rights in the UK before they started seeking work:
Worker
Self-employed
Student
Self-sufficient
You must provide evidence that the EEA national was in the UK in one of the above categories immediately before they started seeking work. See sections 6, 7, 8 and 9 for guidance on the type of evidence to submit.
6B.4 Date the EEA national ceased the above activity:
day month year
6B.5 Date the EEA national started seeking work:
day month year
Both categories – evidence of seeking work
6B.6 You must provide evidence that the relevant EEA national is seeking work in the UK and has a genuine chance of finding work. This could include:
* copies of job applications
* invitations to interviews
* rejection letters from employers
* proof of registration with a recruitment agency
* proof of receipt of Jobseeker's Allowance or national insurance credits
* evidence of relevant professional, vocational or academic qualifications, or relevant work experience.
We will not normally issue a registration certificate if the EEA national has been unemployed for longer than six months, unless they can provide compelling evidence that they are continuing to seek work and have a genuine chance of finding work.
SECTION 7 - SELF-EMPLOYMENT
Complete this section with details of the EEA national's self-employment if the application is being made on this basis. If the EEA national has ceased self-employment due to an illness or accident, please ensure you also complete question 7.6 below.
If your EEA national family member has already acquired permanent residence, please provide either their document certifying permanent residence (if they have one) or evidence of how they acquired permanent residence, for example evidence of exercising Treaty rights for a continuous period of 5 years prior to the date at which they acquired permanent residence.
7.1 Name of business
7.2 Business address
Postcode
7.3 Business telephone number
7.4 Evidence of self-employment/business please provide at least one of the following documents:
Invoices/receipts
Accountant's letter
Business bank statements
7.5 Additionally you can also provide:
A lease on business premises (if applicable)
HM Revenue & Customs (HMRC) self-assessment forms (if applicable)
Evidence of National Insurance Contributions paid
7.6 If the EEA national is temporarily unable to pursue self-employed activity due to an illness or accident, please provide:
A medical report or letter from a doctor confirming the nature of the illness or accident and that the incapacity is not expected to be permanent.
If the incapacity is expected to be permanent, consider completing form EEA3 instead.
Evidence that the EEA national was self-employed immediately before the illness or accident – see 7.1 to 7.5 above.
SECTION 8 - STUDENT
Complete this section with details of the EEA national's study arrangements if the application is being made on this basis.
8.1 Name and address of the educational establishment at which you/your EEA national family member are studying
Postcode
8.2 Telephone number of establishment
8.3 Course title
8.4 Date course of study starts/started
day month year
8.5 You must provide all of the following documentary evidence of the course of study and funds:
A school, college or university letter confirming enrolment
A bank statement or evidence of a grant or scholarship or a declaration of sufficient funds
Evidence of comprehensive sickness insurance for the EEA national exercising Treaty rights
SECTION 9 - SELF-SUFFICIENT PERSON
Complete this section if the EEA national exercising Treaty rights in the UK is economically self-sufficient.
Evidence of comprehensive sickness insurance for you and any family members included in this application. See section 12 for guidance on what evidence to submit.
Evidence of sufficient funds to maintain you and any family members included in this application. This could include bank statements showing sufficient savings, details of investments, or evidence of receipt of a pension if you are retired. If a friend, relative or other person not included in this application is financially supporting you/your family members, please provide a letter from them confirming this, together with evidence of their finances.
SECTION 10 - PER SO N AL H I ST O R Y
Personal History (criminal convictions, war crimes, etc.)
Please provide details as requested below of any criminal convictions you may have both in the UK and overseas. However, please note that should you fail to provide this information this will not result in the rejection of your application. Please note that it is an offence under Section 26(1)(c) of the Immigration Act 1971 to make a statement or representation which you know to be false or do not believe to be true.
Information given will be checked with other agencies.
10.1. Have you or any family members who are applying with you been convicted of any criminal offence in the UK or any other country?
Yes
- go to question 10.2
No
- go to question10.3
10.2. Please give details below for each criminal conviction, starting with the most recent one. If you or any family members who are applying with you have received more than two convictions, please photocopy this page and enclose it with this form.
Note: We will carry out criminal record checks on all applicants and family members. You must give details of all unspent and spent criminal convictions. This includes road traffic offences but not fixed penalty notices (such as speeding or parking tickets) unless they were part of a sentence of the court. This includes all drink-driving offences.
Criminal conviction 1
Country where convicted
Nature of the offence
Sentence given
Date sentenced
DDMMYYYY
If you or any family members who are applying with you were sentenced to a period of imprisonment, what was the length of the prison sentence imposed (in months)?
months
Criminal conviction 2
Country where convicted
SECTION 10 - PER SO N AL H I ST O R Y
Nature of the offence
Sentence given
Date sentenced
DDMMYYYY
If you or any family members who are applying with you were sentenced to a period of imprisonment, what was the length of the prison sentence imposed (in months)?
months
10.3. Do you or any family members who are applying with you have any civil judgments against you or any civil penalty under the UK Immigration Acts?
Yes go to 10.4
No go to 10.5
10.4. Give details for each civil judgment or any civil penalty under UK the Immigration Acts, starting with the most recent one.
If you or any family members who are applying with you have received more than two civil judgments and/or civil penalties under the UK Immigration Acts, please photocopy this page and enclose it with this form.
Details of judgment or civil penalty 1
Date of judgment or civil penalty
DDMMYYYY
Country where judgment made
Details of judgment or civil penalty 2
Date of judgment or civil penalty
DDMMYYYY
Country where judgment made
SECTION 10 - PER SO N AL H I ST O R Y
You must answer questions 10.5 to 10.10 below even if you have answered no to question 10.1.
For help in answering these questions, please see the definitions at the end of this section.
10.5. Have you or any family members who are applying with you ever been charged in any country with a criminal offence for which you have not yet been tried in court?
Yes
No
10.6. In times of either peace or war have you or any family members who are applying with you ever been involved, or suspected of involvement, in war crimes, crimes against humanity or genocide?
Yes
No
10.7. Have you or any family members who are applying with you ever been involved in, supported or encouraged terrorist activities in any country?
Yes
No
10.8. Have you or any family members who are applying with you ever been a member of, or given support to, an organisation which has been concerned in terrorism?
Yes
No
10.9. Have you or any family members who are applying with you ever, by any means or medium, expressed views that justify or glorify terrorist violence or that may encourage others to terrorist acts or other serious criminal acts?
Yes
No
10.10. Have you or any family members who are applying with you ever engaged in any other activities which might indicate that you may not be considered to be persons of good character?
Yes
No
10.11. How long have you lived in the UK?
Years
Months
Please provide details of any periods of absence of more than 6 months during that time.
SECTION 10 - PER SO N AL H I ST O R Y
10.12. Please state what ties you have with;
* The country where you were born
* Any other country whose nationality you hold
* Any country where you have lived for more than 5 years
You should tell us about any family, friends, or other connections with that country.
10.13. If you have answered yes to question 10.5, 10.6, 10.7, 10.8, 10.9 or 10.10, you must give further details in the space provided below. If you need more space, continue on a separate sheet and enclose it with this form.
SECTION 10 - PERSONAL HISTORY (continued)
DEFINITIONS
For the purposes of answering questions 10.5 to 10.10 the following information provides guidance on actions which may constitute war crimes, crimes against humanity, genocide or terrorist activities.
This guidance is not exhaustive. The full definitions of war crimes, crimes against humanity and genocide can be found in Schedule 8 of the International Criminal Court Act 2001 at www.opsi.gov.uk/ acts/acts2001/ukpga_20010017_en_1 or purchased from The Stationery Office (telephone 0870 600 5522). It is your responsibility to satisfy yourself that you are familiar with the definitions and can answer the questions accurately on behalf of yourself and any family members who are applying with you.
War crimes
Grave breaches of the Geneva Conventions committed during an armed conflict. This includes an internal armed conflict and an international armed conflict. The types of acts that may constitute a war crime include wilful killing, torture, extensive destruction of property not justified by military necessity, unlawful deportation, the intentional targeting of civilians and the taking of hostages.
Crimes against humanity
Acts committed at any time (not just during armed conflict) as part of a widespread or systematic attack, directed against any civilian population with knowledge of the attack. This would include offenses such as murder, torture, rape, severe deprivation of liberty in violation of fundamental rules of international law and enforced disappearance of persons.
Genocide
Acts committed with intent to destroy, in whole or in part, a national, ethnical, racial or religious group.
Terrorist activities
Any act committed, or the threat of action, designed to influence a government of intimidate the public and made for the purposes of advancing a political, religious or ideological cause and that involves serious violence against a person, that may endanger another person's life, creates a serious risk to the health or safety of the public, involves serious damages to property, or is designed to seriously disrupt or interfere with an electronic system.
Organisations concerned in terrorism
An organisation is concerned in terrorism if it commits or participates in acts of terrorism, prepares for terrorism. promotes or encourages terrorism (including the unlawful glorification of terrorism), or is otherwise concerned in terrorism.
SECTION 11 - PHOTOGRAPHS
You must provide the relevant photographs specified below. They must be in the format specified in the separate Home Office photograph guidance. If they are not, they may be rejected as unacceptable and you will have to provide others which are acceptable. This will delay consideration of your application. Tick the relevant box(es) to confirm the photographs you are providing and enclose them in a small sealed envelope attached to section 1 as instructed there.
Two recent identical colour passport-size photographs of yourself with your name written on the back of each one. Please see the guidance notes for information on what types of photograph are acceptable.
Two recent identical colour passport-size photographs of each family member included in section 2 and applying for an extension of stay in the UK with you, with their name written on the back of each one.
SECTION 12 - DOCUMENTS
For your application to be complete, you must provide the documents specified below which are relevant to your application. If you do not, we reserve the right to decide your application on the basis of the information and documents provided. Tick the relevant box(es) to show the documents you are providing. The documents must be originals. Any which are not in English must be accompanied by a reliable English translation.
The evidence relating to sections 6 to 9 listed below is evidence of the EEA national who is exercising Treaty rights in the UK. Even if you are applying on the basis of being a family member of an EEA national who is not applying for a registration certificate at this time you must provide evidence of how they are exercising Treaty rights.
Please note that in some cases, we may have to ask for other documentation in addition to those specified in this form.
Your current passport or ID card and that of your EEA national family member who is exercising Treaty rights in the UK if they are not applying on this form. If you last entered the UK on a previous passport or ID card, please also provide this document if you have it. If you do not have a passport or ID card, you must provide another form of identity and explain why you are unable to provide a valid passport or ID card.
The current passport(s) or ID card(s) of each family member included in section 2 for whom a registration certificate is required. If they do not have a passport or ID card, they must provide another form of identity and explain why they are unable to provide a valid passport or ID card.
If Section 4 (Retained Rights) has been completed: evidence as applicable such as your EEA national family member's death certificate or proof they have left the UK. Proof of a child or grandchild attending an educational course.
If section 5 (Surinder Singh cases) has been completed: evidence that you and your British citizen family member resided in another EEA member state at a time when they were a worker or self-employed person in that member state, such as tenancy agreements, bank statements, utility bills. See section 5 for further guidance on the information and evidence you must submit. You should also refer to the section below for employment or self-employment as applicable.
If section 6 (employment) has been completed: this can include contracts of employment, letter(s) from your employer(s) confirming your employment or your most recent wage slips (at least one) should be provided. These should feature a full National Insurance Number rather than a temporary one. If you have also completed section 5 (Surinder Singh cases) you must provide the above specified evidence to show that your British citizen family member was employed in another EEA member state.
If section 6A (retained status as worker) has been completed, please provide the documents and information specified within that section.
If section 6B (jobseeker) has been completed, please provide the documents and information specified within that section.
If section 7 (self-employment) has been completed: this can include evidence to show you are self-employed, e.g. a lease on business premises, HM Revenue & Customs (HMRC) self-assessment forms, business bank statements, invoices or receipts or National Insurance contributions. If you have also completed section 5 (Surinder Singh cases) you must provide the above specified evidence to show that your British citizen family member was self-employed in another EEA member state.
If section 8 (students) has been completed: Evidence of a school, college or university letter confirming enrolment on a course of study, evidence of comprehensive sickness insurance (see section below on comprehensive sickness insurance) and evidence of funds available to you such as a bank statement, a document confirming the receipt of a grant or scholarship, or a declaration of sufficient funds.
If section 9 (economically self-sufficient) has been completed: Evidence of comprehensive sickness insurance for the EEA national exercising Treaty rights and
any family members included in the application (see section below on comprehensive sickness insurance). Evidence of funds to show you are economically self-sufficient, e.g. a bank statement. If these funds come from a family member, evidence of their employment or funds should be supplied. Evidence to show you are retired, e.g. document(s) confirming the receipt of a pension.
As evidence of comprehensive sickness insurance (This requirement only applies to persons exercising Treaty rights as students or self-sufficient persons):
You must provide either a private comprehensive sickness insurance policy document that covers for medical treatment in the majority of circumstances, or a European Health Insurance Card (EHIC). The EHIC is only valid when your stay in the UK is on a temporary basis. Therefore if you do provide your EHIC as proof of comprehensive sickness insurance you should also provide a covering letter stating whether it is your intention to stay in the UK on a temporary or permanent basis and your reasons for this. This must be signed and dated by you.
As evidence of relationships:
For family relationships: marriage certificates, civil partnership certificates or birth certificates.
For unmarried partners: proof that you are in a durable relationship. Generally this is proof that you have been in a subsisting relationship for two years or more, such as joint bank or building society statements, joint tenancy agreements, council tax bills or evidence that you are both paying utility bills at the property at which you reside.
As evidence of current residence in the UK by you and your family members:
Proof of residence: this can include tenancy agreements, utility bills and bank statements. For children this could include letters from their school.
As evidence of dependency on your EEA national family member:
For children and grandchildren over 21 and direct relatives in the ascending line: Evidence that the EEA national family member has sufficient funds to maintain you, and that you are, in practice, reliant on these funds to meet your needs such as for example, bank statements and evidence of money transfers.
For more distant relatives such as cousins, nephews and nieces: Evidence that your EEA national family member was maintaining you before your admission to the UK and continues to do so. For example, bank statements and evidence of money transfers. Or that you were a member of the EEA national family household in the country from which they have recently come, and that you are members of the same household in the UK. For example, joint bank or building society statements, joint tenancy agreements, council tax bills or other evidence that you share and have shared the same address.
SECTION 13 - DECLARATION
Please read the declaration below and sign it. It should be signed by you (the applicant) and not by a representative or other person acting on your behalf. If you are under 18, your parent or guardian should sign it.
I hereby apply for a registration certificate for myself and any EEA national family members listed in this form. The information I have given in this form is complete and is true to the best of my knowledge.
I confirm that the photographs submitted with this form are a true likeness of myself and any family members applying with me, as named on the back of each photograph, and that I have had the opportunity to see the Home Office photograph guidance.
I confirm that if, before this application is decided, there is a material change in my circumstances or new information relevant to this application becomes available, I will inform the Home Office.
I understand that all information provided by me to the Home Office will be treated in confidence but that it may be disclosed to other government departments, agencies, local authorities, the police, foreign governments and other bodies for immigration purposes or to enable them to perform their functions, and that, if such bodies provide the Home Office with any information about me which may be relevant for immigration purposes, it may be used in reaching a decision on my application.
I understand that my details may in certain circumstances be passed to fraud prevention agencies to prevent and detect fraud and money laundering. I also understand that such agencies may provide the Home Office with information about me. Further details explaining when information may be passed to or from fraud prevention agencies and how that information may be used can be obtained from the Home Office website.
I understand that documents provided in support of this application will be checked for authenticity, and that false documents will be retained and may result in my application being refused and in my prosecution and subsequent removal from the UK.
I understand that the Home Office may also use the information provided by me for training purposes.
I am aware that it is an offence to make a statement or representation which I know to be false or do not believe to be true, or to obtain, or seek to obtain a registration certificate by means which include deception.
I understand that if I am informing the Home Office that I have changed my gender, these details may in certain circumstances be shared with other Home Office colleagues. I consent to this, where necessary and understand that this information will only be shared in limited circumstances relating to identity and security in line with Section 22 of the Gender Recognition Act. I am aware they will otherwise be treated in confidence and that my rights under the Equality Act 2010, Data Protection Act 1998 and Article 8 of the European Convention on Human Rights will be unaffected.
Signed
Date
PHOTOGRAPHS AND DOCUMENTS CHECKLIST
Please complete this part of the form to help us check that we have received your photographs and documents and to keep a record of them while they are with us. At 'A' tell us how many of each of the listed items you are providing with your application. At 'B' list any other documents provided by you and state how many in each case. Continue on a separate sheet if necessary and enclose it with this form. All documents must be originals.
A. Listed items
ID cards
UK
Please note that, in some cases, we may have to ask for other documents in addition to those specified in this form
FINAL CHECKLIST
To ensure that your application is complete, please make the following checks before posting it. Tick each box that is relevant to your application.
Is EEA1 the right form for you and is it valid for use? See date on front page
Have you completed all relevant sections of the form as specified?
Have you paid the specified fee? See payment guidance notes.
Have you sent the documents and photographs specified in section 11 and 12 as listed above?
Current passport(s) or ID card(s) including those for family members
Photographs
Proof of having retained right of residence (if applicable)
All other relevant documents specified in section 12
Have you, or your parent/guardian if you are under 18, signed and dated the declaration in section 13?
If you are unable to send us any of the documents specified in section 12 which are relevant to your application have you given an explanation and said when you will be able to send them?
Finally, please make sure that the application is addressed as shown below:
Home Office - EEA Applications
PO Box 590
Durham
DH99 1AD
|
<urn:uuid:77bf9ca2-45d5-4f59-9143-a0d3453cf30e>
|
CC-MAIN-2024-51
|
https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/316387/EEA_1_Registration_Certificate_06-14.pdf
|
2024-12-05T13:46:13+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-51/subset=warc/part-00106-b392068a-8e35-4497-8fab-a691b1a71843.c000.gz.parquet
| 99,081,261
| 13,591
|
eng_Latn
|
eng_Latn
| 0.995759
|
eng_Latn
| 0.996843
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1590,
3301,
5520,
5869,
7497,
7546,
10271,
12633,
15262,
17054,
18667,
19215,
20644,
21574,
23837,
26098,
28046,
29285,
30429,
31038,
31620,
32854,
34319,
36215,
38431,
40212,
41044,
42948,
44116,
45821,
46852,
48379,
48918,
51357,
55084,
58187,
59149,
62136,
62763,
63863
] |
Uniform Data System (UDS) Reports in the HRSA EHBs
Accessing Standard UDS Reports
A quick reference sheet for Program Awardees
The Uniform Data System (UDS) is a system through which organizations funded under the Health Center Cluster program (Activity Code H80), administered by the Bureau of Primary Health Care, submit annual performance reports. Health Centers report patient demographics, services provided, staffing, clinical indicators, utilization rates, costs, and revenues.
The HRSA Electronic Handbooks (EHBs) includes reports based on data collected through UDS, as enumerated under the List of Standard UDS Reports below, which are accessed through the UDS reports. To access your UDS reports, follow the steps under Accessing UDS Reports in the HRSA EHB below.
Accessing UDS Reports in the HRSA EHBs
Perform the following steps to access your UDS reports:
1. Log in to the EHBs.
2. In the Top Navigation panel, click theGrantstab (Figure 1).
3. The My Grant Portfolio – List page opens, where your grants are displayed in a list (Figure 2). Find the Health Center Cluster grant (grant number begins with "H80") and clickGrant Folder.
4. The Grant folder opens to the Grant Home page (Figure 3). In the Grants section of the page, under Submissions, clickPerformance Report.
5. The Submissions – All page opens, displaying all performance reports related to the grant (Figure 4). To display only UDS reports, you can enter search parameters under Search Filters at the top of the page. For example, you can enter "UDS" in the Submission Name Like field, and then clickSearch.
The list at the bottom of the page will display only UDS reports.
6. Choose a Reporting Period. For the UDS report submitted for that Reporting Period, clickPerformance Reports(Figure 5).
7. The page that will open after clicking Performance Reports link on the Submission – All
7.1 For reports submitted prior to 2018 reporting period, page titledReview(Figure 6) will open. Use the Access reports and data related to your UDS submissionlink to open reports. TheUDS Report pagewill open (Figure 7). Use the View link to open a report.
3
7.2 For UDS Reports submitted in 2018 and later reporting period, will open in a separate Review and Report list page. The page lists all the Reports on top of the page and Tables on the second half of the page (Figure 8). Click View link adjacent to each of the reports to access the reports.
List of Standard UDS Reports
The following reports can be accessed by following the steps given above.
UDS Data file in XML
Provides the submitted raw UDS data file in XML format. The file can be downloaded and/or emailed. This will be available to the Health Center after they have submitted their UDS report at least once to HRSA for review.
UDS Summary Report
Provides the summary and analysis on the Health Center's current UDS data using measures across various Tables of the UDS report. The Preliminary version of this report will only have the Awardees view available. Once all the UDS reports for the current reporting cycle have been processed, the final version of this report will be available which will have Awardees, State and National views.
UDS National and State Rollups
This report compiles annual data reported by Health Center Program (HCP) Health Centers. Summary HCP data are provided for patient demographics, socioeconomic characteristics, staffing, patient diagnoses and services rendered quality of care, health outcomes and disparities, financial costs, and revenues. This will be available after all the UDS reports for the current reporting cycle have been processed.
UDS Health Center Trend Report
This report compares the health center's performance for 16 key performance measures (in three categories: Access, Quality of Care/Health Outcomes, and Financial Cost/Viability) with national and state averages over a 3 year period. This will be available after all the UDS reports for the current reporting cycle have been processed.
UDS Health Center Performance Comparison Report
Provides the summary and analysis on the Health Center's latest UDS data giving details at Awardees, State, National, Urban and Rural level with trend comparisons and percentiles. This will be available after all the UDS reports for the current reporting cycle have been processed.
For Help and Support
To access additional EHBs‐related resources and training materials, once logged into EHB, please click the Support (EHBs Help) icon located in the toolbar at the lower right of the screen. System navigation, UDS reporting acronyms, quick reference sheets for accessing reports, submission and review process, and other useful training materials and resources can be accessed here.
UDS reporting questions: Your Reviewer or the UDS Help Desk [email protected] 866‐837‐4357 (866‐UDS‐HELP)
EHB account and user access questions: HRSA Call Center
http://www.hrsa.gov/about/contact/ehbhelp.aspxor 877‐464‐4772 (877‐Go4‐HRSA) Monday through Friday (except federal holidays) 8 AM to 8 PM (ET)
EHB electronic reporting issues: BPHC Help Desk
http://www.hrsa.gov/about/contact/bphc.aspxor 877‐974‐2742 (877‐974‐BPHC)
Monday through Friday (except federal holidays) 8:30 AM to 5:30 PM (ET)
Software and Compliance Requirement
Software Requirements
The developed functionality will be compatible with the browser(s) recommended within the Browser Requirements section of the HRSA EHBs portal. The information can be found at –
5
https://grants3.hrsa.gov/2010/WebEPSExternal/Interface/common/BrowserSettings.aspx.
Section 508 Compliance
Section 508 compliance testing was done to ensure that the UDS is in compliance with requirements that users with disabilities have equivalent access to the system developed.
|
<urn:uuid:3980f9a9-7007-4232-a83b-81e149bb18f0>
|
CC-MAIN-2020-16
|
http://18vtj92co9zb1qy8011oc0fw-wpengine.netdna-ssl.com/wp-content/uploads/L1_QRSAccessingUDSReportsinEHB330-1.pdf
|
2020-04-01T20:42:08+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-16/subset=warc/part-00110-5e0433ee-fa15-4837-b2dc-d6f38301af97.c000.gz.parquet
| 1,133,797
| 2,005
|
eng_Latn
|
eng_Latn
| 0.977152
|
eng_Latn
| 0.99069
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1295,
1664,
2138,
2781,
5498,
5783
] |
THE WORK OF GEORGE ANDREWS:
A MADISON PERSPECTIVE
BY
RICHARD ASKEY
1. Introduction.
In his own contribution to this volume, George Andrews has touched on a number of themes in his research by looking at the early influences on him of Bailey, Fine, MacMahon, Rademacher and Ramanujan.
In this paper, I propose to present a survey of his work organized on a different theme. George has often alluded to the fact that his 1975–76 year in Madison was extremely important in his work. So it seems a reasonable project to survey his career from a Madison perspective. To make this story complete, I must begin in Sections 2–4 with Andrews’ work in the late 1960’s that led inexorably to our eventual lengthy collaboration. The year in Madison set in motion three seemingly separate strands of research that were fundamental in much of his subsequent work. These are described in Sections 5–8. Section 9 briefly describes his collaboration with Rodney Baxter. Section 10 describes the discovery of the crank. Section 11 contains a few concluding and summarizing comments.
2. Partition Identities.
From the time Rademacher taught him about the magic and mystery of the Rogers-Ramanujan identities, George was fascinated with such results. At first, he pursued them purely for their esthetic appeal. Rademacher [79; Lectures 7 and 8, pp. 68–84] presented the Rogers-Ramanujan identities as
follows:
\begin{equation}
1 + \frac{q}{1-q} + \frac{q^4}{(1-q)(1-q^2)} + \frac{q^9}{(1-q)(1-q^2)(1-q^3)} + \cdots \\
= \prod_{n>0, n \equiv \pm 1 \pmod{5}}^{\infty} \frac{1}{(1-q^n)},
\end{equation}
\begin{equation}
1 + \frac{q^2}{1-q} + \frac{q^6}{(1-q)(1-q^2)} + \frac{q^{12}}{(1-q)(1-q^2)(1-q^3)} + \cdots \\
= \prod_{n>0, n \equiv \pm 2 \pmod{5}}^{\infty} \frac{1}{(1-q^n)},
\end{equation}
and he noted following MacMahon and Schur [79; pp. 69–72] that each may be interpreted partition – theoretically.
Identity (2.1) is equivalent to the assertion that the partitions of $n$ in which parts differ by at least 2 are equinumerous with the partitions of $n$ into parts congruent to $\pm 1$ modulo 5.
Identity (2.2) is equivalent to the assertion that the partitions of $n$ into parts each > 1 in which the parts differ by at least 2 are equinumerous with the partitions of $n$ into parts congruent to $\pm 2$ modulo 5.
Rademacher [79; pp. 72–73] goes on to say
“The unexpected element in all these cases is the association of partitions of a definite type with divisibility properties. The left-side in the identities is trivial. The deeper part is the right side. It can be shown that there can be no corresponding identities for moludi higher than 5. All these appear as wide generalizations of the old Euler theorem in which the minimal difference between the summands is, of course, 1. Euler’s theorem is therefore the nucleus of all such results.”
Now while it may be argued that Rademacher was making a narrow statement here, it was taken by George to mean that there are no more results of this type.
So in his first year at Penn State much to his surprise, he discovered a generalization of the Rogers-Ramanujan identities by studying a paper of Selberg [83] which was quoted in a paper of Dyson [60] which in turn was quoted in Hardy and Wright [72]. Several months after his discovery, he learned that it had already been found by Basil Gordon [67].
Selberg based his extension of the Ramanujan-Rogers [80; pp. 214–215, 344–346] proofs of (2.1) and (2.2) on the following function
\begin{equation}
C_{ki}(x;q) = \sum_{n=0}^{\infty} \frac{(-1)^n x^{kn} q^{\frac{1}{2}(2k+1)n(n+1)-in}(xq;q)_n(1-x^i q^{(2n+1)i})}{(q;q)_n},
\end{equation}
where
\begin{equation}
(a;q)_n = (1-a)(1-aq)\cdots(1-aq^{n-1}).
\end{equation}
George’s proof [19; Ch. 7] of Gordon’s generalization follows quite directly from the elegant functional equation found by Selberg [83]
\begin{equation}
C_{k,i}(x;q) - C_{k,i-1}(x;q) = x^{i-1} q^{i-1}(1-xq)C_{k,k-i+1}(xq;q).
\end{equation}
However, what really got his attention was a review by W. Schwarz [82] of the Ph.D. thesis of Heinz Göllnitz [65]. The first paragraph of the review reads as follows:
“Continuing work of Schur [S.-B. Deutsch. Akad. Wiss. Munich 1926, 488–495] and Gleißberg [Math. Z. 28 (1928), 372–382], the author states about 15 theorems on partitions; for instance, the number of partitions of $n$ ($n = a_1 + a_2 + \cdots, a_1 \geq a_2 \geq \cdots$) into positive integers $a_i \equiv 2, 5$ or $11 \pmod{12}$ is equal to the number of partitions of $n$ into different parts $b_i \equiv 2, 4$ or $5 \pmod{6}$, and is equal to the number of partitions of $n$ into parts $c_i \neq 1, 3$, where $c_i - c_{i+1} \geq 6$ and $c_i - c_{i+1} > 6$, if $c_i \equiv 0, 1$ or $3$ and $c_{i+1} \equiv 0, 1$ or $3 \pmod{6}$.”
It was easy enough for anyone to check this theorem for say $n \leq 20$; however, George had no idea from his previous work how to prove this. So he wrote to Schwarz to see if he could obtain a copy of the Göllnitz thesis, and Schwarz sent him the review copy. This paper was challenging to say the least. The proof of the “mod 12” theorem alluded to above was elementary but absolutely overwhelming; it is a reasonably safe guess that no one (including George) has ever read it in detail. Indeed the study of the “mod 12” identity led to one stream of thought that has continued to this day and involved fruitful collaborations [2], [8], [9], [15], [16], [46]. However, the work in Göllnitz’s thesis refers to work by Göllnitz undergraduate thesis [64] and that had the most profound impact on George’s research. Namely
Göllnitz proved the following identities: [64; p. 37]
\begin{align}
(2.6) \quad &1 + q \frac{1+q}{1-q^2} + q^4 \frac{(1+q)(1+q^3)}{(1-q^2)(1-q^4)} \\
&+ q^9 \frac{(1+q)(1+q^3)(1+q^5)}{(1-q^2)(1-q^4)(1-q^6)} + \cdots + q^{n^2} \prod_{k=1}^{n} \frac{1+q^{2k-1}}{1-q^{2k}} + \cdots \\
&= \prod_{n=0}^{\infty} \frac{1}{(1-q^{8n+1})(1-q^{8n+4})(1-q^{8n+7})};
\end{align}
\begin{align}
(2.7) \quad &1 + q^3 \frac{1+q}{1-q^2} + q^8 \frac{(1+q)(1+q^3)}{(1-q^2)(1-q^4)} \\
&+ q^{15} \frac{(1+q)(1+q^3)(1+q^5)}{(1-q^2)(1-q^4)(1-q^6)} + \cdots + q^{n(n+2)} \prod_{k=1}^{n} \frac{1+q^{2k-1}}{1-q^{2k}} + \cdots \\
&= \prod_{n=0}^{\infty} \frac{1}{(1-q^{8n+3})(1-q^{8n+4})(1-q^{8n+5})}.
\end{align}
Göllnitz based his entire development on proving $q$-difference equations for the following function [64; p. 37]
\begin{align}
(2.8) \quad &G(s) = 1 = \sum_{n=1}^{\infty} (-1)^n s^{2n} q^{n(4n-1)} (1-sq^{4n}) \\
&\times \frac{(1+q)(1+q^3)() \cdots (1+q^{2n-1})}{(1+sq)(1+sq^3) \cdots (1+sq^{2n-1})} \cdot \frac{(1-sq^2)(1-sq^4) \cdots (1-sq^{2n-2})}{(1-q^2)(1-q^4)(1-q^6) \cdots (1-q^{2n})} \\
&= 1 - s^2 q^3 \frac{(1-sq^4)(1+x)}{(1+sq)(1-q^2)} + s^4 q^{14} \frac{(1-sq^8)(1+q)(1+q^3)((1-sq^2)}{(1+sq)(1+sq^3)(1-q^2)(1-q^4)} \\
&- s^6 q^{33} \frac{(1-sq^{12})(1+q)(1+q^3)(1+q^5)(1-sq^2)(1-sq^4)}{(1+sq)(1+sq^3)(1+sq^5)(1-q^4)(1-q^6)} + \cdots
\end{align}
George saw that $G(s)$ and $C_{k,i}(x;q)$ had to lie in a general family of such series. By extrapolating from these results, he was able [7] to provide a generalization of (2.6) and (2.7) (known as the Göllnitz–Gordon identities [64], [68]). From there he was led to a study of very-well-poised $q$-hypergeometric series [8] and their combinatorial implications [9], [15]. The culmination of this effort yielded the main theorem of [15].
**Definition 1.** If $\lambda$ is an even integer, we denote by $A_{\lambda,k,a}(n)$ the number of partitions of $n$ into parts such that no part $\not\equiv 0(\mod \lambda + 1)$ may be repeated and no part is $\equiv 0, \pm(a - \frac{1}{2}\lambda)(\lambda + 1) (\mod (2k - \lambda + 1)(\lambda + 1))$. If $\lambda$ is an odd integer, we denote by $A_{\lambda,k,a}(n)$ the number of partitions of $n$ into parts such that no part $\not\equiv 0(\mod \frac{1}{2}(\lambda + 1))$ may be repeated, no part is $\equiv \lambda + 1(\mod 2\lambda + 2)$, and no part is $\equiv 0, \pm(2a - \lambda)\frac{1}{2}(\lambda + 1) (\mod (2k - \lambda + 1)(\lambda + 1))$.
**Definition 2.** Let $B_{\lambda, k, a}(n)$ denote the number of partitions of $n$ of the form $b_1 + b_2 + \cdots + b_s$, with $b_i \geq b_{i+1}$, no parts $\not\equiv 0 \pmod{\lambda+1}$ are repeated, $b_i - b_{i+k-1} \geq \lambda+1$ with strict inequality if $(\lambda+1) \mid b_i$, and finally if $f_j$ denotes the number of appearances of $j$ in the partition, then
$$\sum_{i=j}^{\lambda-j+1} f_i \geq a - j$$
for $1 \leq j \leq \frac{1}{2}(\lambda+1)$, and $f_1 + f_2 + \cdots + f_{\lambda+1} \leq a - 1$.
**Theorem.** If $\lambda$, $k$, and $a$ are positive integers with $\lambda/2 < a \leq k$, $k \geq \lambda$, then
$$A_{\lambda, k, a}(n) = B_{\lambda, k, a}(n).$$
The Rogers-Ramanujan identities are the cases $\lambda = 0$, $k = a = 2$ and $\lambda = 0$, $k = 2$, $a = 1$. Gordon’s generalization is the case $\lambda = 0$. George’s generalization of Göllnitz-Gordon is $\lambda = 1$, and his generalization of Schur’s theorem in [14] is $\lambda = 2$.
Ironically, H. Alder [1] proved that $B_{\lambda, 2, 2}(n)$ is never equal to the number of partitions of $n$ taken from a fixed subset $S$ of the positive integers unless $\lambda \leq 2$. The above theorem states clearly that while the particular generalization of Schur’s theorem considered by Alder does not exist, there are indeed valid Gordon-like generalization of Alder’s non-existence theorems for $B_{\lambda, k, a}(n)$. Indeed all that is necessary is that $k \geq \lambda$.
This number-theoretic tour deforce made inevitable our meeting and collaboration. I too had been led into considering very-well-poised series of the ordinary (i.e. $q = 1$) type. They arose naturally in the solution of the connection coefficient problem for Jacobi polynomials [55; p. 63], [56].
### 3. More q-Series.
By now, George was thoroughly engrossed in the study of $q$-series. His discovery that very well-poised series led to grand generalizations of the Rogers-Ramanujan identities caused him to look at a variety of $q$-series. In light of his work extending Watson’s proof [85] of Ramanujan’s fifth order mock theta function identities [4] [5] [6], George eventually considered $q$-Appell series. In a short paper [11], he showed that if
$$\Phi^{(1)}[a; b, b'; c; x, y] = \sum_{n=0}^{\infty} \sum_{m=0}^{\infty} \frac{(a)_{m+n}(b)_m(b')_nx^my^n}{(q)_m(q)_n(c)_{m+n}},$$
and
$$r+1\phi_r \left[ \begin{array}{c} a_0, a_1, \ldots, a_r; q, z \\ b_1, \ldots, b_r \end{array} \right] = \sum_{n=0}^{\infty} \frac{(a_0)_n(a_1)_n \cdots (a_r)_nz^n}{(q)_n(b_1)_n \cdots (b_r)_n},$$
where
\[(3.3) \quad (a)_n = (1 - a)(1 - aq) \cdots (1 - aq^{n-1}),\]
then
\[(3.4) \quad \Phi^{(1)}[a; b, b'; c; x, y] = \frac{(a)_\infty(bx)_\infty(b'y)_\infty}{(c)_\infty(x)_\infty(y)_\infty} \ _3\phi_2 \left( \begin{array}{c} c/a, x, y; q, a \\ bx, b'y \end{array} \right).\]
I found this result quite disturbing. At first glance, it is unreasonable. The Appell function \(F^{(1)}\) [54; Ch. IX] certainly does not reduce to an ordinary \(3F_2\), and yet the above result asserts that a generalization of \(F^{(1)}\) reduces to an ordinary \(q\)-hypergeometric function. Indeed, as George subsequently pointed out [18], all the known theorems for \(\Phi^{(1)}\) are merely specializations of classical \(3\phi_2\) transformations. It turns out that there is a satisfying and benign explanation of (3.4) as a \(q\)-integral which we both came to understand several years later during his visit to Madison in 1975–76. Namely, it is the \(q\)-analog of the integral representation of \(F^{(1)}\).
In addition to this work, George was also considering \(q\)-series from the point of view of Rota’s theory of functions of binomial type. Again he produced a study that disturbed me in quite a different way. In his paper on Eulerian differential operators [8], George suggests that there is probably no \(q\)-analog of the Rodrigues formula. His discussion was clearly inadequate to say the least; indeed, we found numerous \(q\)-Rodrigues formulas during the year he spent in Madison.
### 4. The Evanston Meeting.
Given the variety of ways that our interests converged (although starting from vastly different viewpoints), I wanted to get George and \(q\)-series involved in the world of special functions. The most immediate opportunity for this was the AMS Special Session on Special Functions that I was organizing for the regional meeting of the A.M.S. at Northwestern on April 27–28, 1973.
Inviting George to this meeting had several beneficial effects. First it did introduce him to many workers in special functions. Second, it induced him to prepare a SIAM Review survey article [16] out of the talk he gave; this was the first survey in a long time (if ever) that attempted to provide a variety of applications of \(q\)-series.
Finally, it provided one of those rare moments when one discovers that someone else shares one of your own pet peeves. For years I had been trying to point out that the rather confused world of binomial coefficient summations is best understood in the language of hypergeometric series identities. Time and again I would find first-rate mathematicians who had never heard
of this insight and who would waste considerable time proving some apparently new binomial coefficient summation which almost always turned out to be a special case of one of a handful of classical hypergeometric identities.
To my great delight, George devoted a substantial portion of his talk to this exact topic. He even made the point more emphatically by illustrating that the hypergeometric understanding led naturally to the almost automatic construction of $q$-analogs. He finished his comments on this topic by asserting that 80% of the formulas in Table 3 of Henry Gould’s Tables [70] yielded to this approach. This was the first portion of his talk with which I disagreed. I pointed out during the question period that the correct percentage was at least 90% if not 95%. Independently, I had worked through the same chapter.
5. The Madison Special Functions Meeting.
After the Evanston meeting, George and I corresponded extensively, and I invited him to the CBMS conference in Blacksburg during June, 1974.
The following year I invited George to give one of the addresses at the MRC Advanced Seminar on Special Functions (March 31–April 2, 1975).
I had only heard George speak twice before; so I had reasonable confidence that he would give an interesting and comprehensible talk. He spoke in Session IV, at 3:15 pm on Tuesday, April 1, 1975. My confidence in his mathematical taste started to disintegrate immediately. His first slide read
Q-ANALOG OF EXTENDED MEIJER’S G-FUNCTION
\[ G_{p,t,s,r}^{n,\nu_1,\nu_2,m_1,m_2} \left[ \begin{array}{c|c}
x & (\epsilon_p) \\
\gamma_t;(\gamma'_t) & q \\
y & (\delta_s) \\
\beta_r;(\beta'_r)
\end{array} \right] = \]
\[ \sum_{h=1}^{m_1} \sum_{k=1}^{m_2} x^{\beta_h} y^{\beta'_k} \frac{\prod_{j=\nu_1+1}^{t} (q/\gamma_j \beta_h)_\infty \prod_{j=\nu_2+1}^{t} (q/\gamma'_j \beta'_k)_\infty}{\prod_{j=1}^{\nu_1} (\gamma_j \beta_h)_\infty \prod_{j=1}^{\nu_2} (\gamma'_j \beta'_k)_\infty} \cdot \frac{\prod_{j=m_1+1}^{r} (q \beta_h/\beta_j)_\infty \prod_{j=m_2+1}^{r} (q \beta'_k/\beta'_j)_\infty}{\prod_{j=1}^{m_2} (\beta'_j/\beta_k)_\infty \prod_{j=1}^{n} (q \beta'_h \beta'_k/\varepsilon_j)_\infty} \cdot \frac{\prod_{j=n+1}^{n} (\varepsilon_j/\beta_h \beta'_k)_\infty \prod_{j=1}^{s} (\delta_j \beta_h \beta'_k)_\infty}{\prod_{j=1}^{m_1} (\beta_j/\beta_h)_\infty} \]
To my horror a second slide was required just to complete this definition. Here is the content of the second slide:
\[ \Phi \left[ \begin{array}{c|c}
p & (q \beta_h \beta'_k/\varepsilon_p) \\
t & (\gamma_t \beta_h);(\gamma'_t \beta'_k) \\
s & (\delta_s \beta_h \beta'_k) \\
r-1 & (q \beta_h/\beta_r)_{h \neq r};(q \beta'_k/\beta'_r)_{k \neq r}
\end{array} \right] (-1)^{m_1+p-n+t-\nu_1} x \]
where
\[ \Phi \left[ \begin{array}{c|c}
p & \varepsilon_1, \varepsilon_2, \ldots, \varepsilon_p \\
t & \gamma_1, \gamma'_1, \ldots, \gamma_t, \gamma'_t \\
s & \delta_1, \delta_2, \ldots, \delta_s \\
r & \beta_1, \beta'_1, \ldots, \beta_r, \beta'_r
\end{array} \right] x \]
\[ \sum_{m=0}^{\infty} \sum_{n=0}^{\infty} \frac{(\varepsilon_1)_{m+n} \cdots (\varepsilon_p)_{m+n} (\gamma_1)_m (\gamma'_1)_n \cdots (\gamma_t)_m (\gamma'_t)_n x^m y^n}{(\delta_1)_{m+n} \cdots (\delta_s)_{m+n} (\beta_1)_m (\beta'_1)_n \cdots (\beta_r)_m (\beta'_r)_n (q)_m (q)_n} \]
where
\[
(a)_n = (a; q)_n = (1 - a)(1 - aq) \cdots (1 - aq^{n-1}),
\]
\[
(a)_{\infty} = \lim_{n \to \infty} (a)_n.
\]
Had he lost his mind? This was the worst possible beginning of a talk on \( q \)-series that I could imagine. I started to hiss at him. Apparently he was waiting for this reaction, because the third slide followed saying:
\section*{APRIL FOOL}
What a relief! His talk (without reference to these first 3 slides) appears in the proceedings of the conference [18]. It contained the seeds of several subsequent important research topics.
This is where the \( q \)-analog of the Dyson conjecture first appeared. Eventually Doron Zeilberger and David Bressoud [86] proved the conjecture. More importantly Ian Macdonald recognized the relationship of this conjecture with his own work [76] on identities, and he subsequently made much more general conjectures which have led to an explosion of research [77].
As bad as those first 3 slides were, George managed to put up a few more complicated formulas, such as Watson’s \( q \)-analog of Whipple’s theorem [57, p. 69]:
\begin{equation}
\begin{aligned}
&\quad \quad _8\phi_7 \left[ \begin{array}{c} a, g\sqrt{a}, -q\sqrt{a}, b, c, d, e, q^{-N}; q, X \\ \sqrt{a}, -\sqrt{a}, \frac{aq}{b}, \frac{aq}{c}, \frac{aq}{d}, \frac{aq}{e}, aq^{N+1} \end{array} \right] \\
&= \frac{(a)_N (aq/ef)_N}{(aq/e)_N (aq/f)_N}_4\phi_3 \left[ \begin{array}{c} \frac{aq}{cd}, e, f, q^{-N}; q, q \\ efq^{-N}/a, \frac{aq}{c}, \frac{aq}{d} \end{array} \right],
\end{aligned}
\end{equation}
where
\[
X = \frac{a^2 q^{N+2}}{bcde}.
\]
George presented the natural full generalization of this in [18], and this contains the basic mechanism of the Bailey chains that he first described fully in [26].
Namely, for $k \geq 1$, $N$ a nonnegative integer,
\[
2k+4 \phi_{2k+3} \left[ \frac{a, q\sqrt{a}, -q\sqrt{a}, b_1, c_1, b_2, c_2, \ldots, b_k, c_k, q^{-N}; q, \frac{a^k q^{k+N}}{b_1 \ldots b_k c_1 \ldots c_k}}{\sqrt{a}, -\sqrt{a}, aq/b_1, aq/c_1, aq/b_2, aq/c_2, \ldots, aq/b_k, aq/c_k, aq^{N+1}} \right]
\]
\[
= \frac{(aq)_n (aq/b_k c_k)_N}{(aq/b_k)_N (aq/c_k)_N} \sum_{m_1, \ldots, m_{k-1}} \frac{(aq/b_1 c_1)_{m_1} (aq/b_2 c_2)_{m_2} \ldots (aq/b_{k-1} c_{k-1})_{m_{k-1}}}{(q)_{m_1} (q)_{m_2} \ldots (q)_{m_{k-1}}}
\]
\[
\times \frac{(b_2)_{m_1} (c_2)_{m_1} (b_3)_{m_1 + m_2} (c_3)_{m_1 + m_2} \ldots}{(aq/b_1)_{m_1} (aq/c_1)_{m_1} (aq/b_2)_{m_1 + m_2} (aq/c_2)_{m_1 + m_2} \ldots}
\]
\[
\times \frac{(b_k)_{m_1 + \cdots + m_{k-1}}}{(aq/b_{k-1})_{m_1 + \cdots + m_{k-1}}} \cdot \frac{(c_k)_{m_1 + \cdots + m_{k-1}}}{(aq/c_{k-1})_{m_1 + \cdots + m_{k-1}}}
\]
\[
\times \frac{(q^{-N})_{m_1 + m_2 + \cdots + m_{k-1}}}{(b_k c_k q^{-N}/a)_{m_1 + m_2 + \cdots + m_{k-1}}}
\]
\[
\times \frac{(aq)^{m_{k-2} + 2m_{k-3} + \cdots + (k-2)m_1} q^{m_1 + m_2 + \cdots + m_{k-1}}}{(b_2 c_2)^{m_1} (b_3 c_3)^{m_1 + m_2} \ldots (b_{k-1} c_{k-1})^{m_1 + m_2 + \cdots + m_{k-2}}}.
\]
Now let’s be honest. This proves George is an analyst. No one but a hard core analyst would have the nerve to extol a formula like this especially after his outrageous April Fool joke.
His comments [18; p. 205] about the work of Holman, Biedenharn and Louck [75] caught the attention of Steve Milne (see for example [78]) who has subsequently in a work spanning two decades revealed what a rich theory was being hinted at in [75].
As is frequently the case, there was a sequel to his marvelous April Fool joke. A bit over a year ago, Doron Zeilberger sent out a three page paper titled “Mathematical Genitalysis: A Powerful New Combinatorial Theory that Obviates Mathematical Analysis.” The abstract claimed that this new combinatorial theory would supersede and sometimes trivialize mathematical analysis, and illustrated this by an exact determination of Bloch’s constant, and two other results. The last paragraph of the paper commented favorably on the NCTM Standards and Calculus Reform, and said that the new theory propounded in the note sent was consistent with these important movements.
George wrote me a note which said in part: “It is 100% certain that Doron sent this to you . . . Whatever the merits of the sketchy body of the text, the last paragraph is vintage stuff.”
My reply was to suggest that George look at the date this was posted on, April 1. He replied: “Why do I always fall for these things?” To which, my reply was: “Since you gave one of the best April Fool’s jokes I have seen or heard, it is fitting that you get fooled at times.”
6. The Year in Madison.
By 1975, we were both aware of many areas of common interest. In particular each of us had looked seriously at the papers that Wolfgang Hahn had published in the late 1940’s and early 1950’s (see especially [71]). Each of us recognized that Hahn was pioneering a topic that was quite important. So I obtained money from the Mathematics Research Center and the Graduate School of the University of Wisconsin for George to spend the 1975-1976 academic year in Madison. Our plan which we followed fairly closely was to work through Hahn’s paper [71].
This seminar led to our extended collaboration culminating many, many years later in the publication of Special Functions [42] (a project whose appearance would have never occurred without the resolute efforts of our co-author, Ranjan Roy).
In addition to our own collaboration, my two students, Jim Wilson and Dennis Stanton were introduced to $q$-series, and each has made substantial contributions to this topic.
The year (so George tells me) was one of the most fruitful of his career. He wrote and submitted The Theory of Partitions during that year. While he was writing Chapter 11 on plane partitions, I happened to mention to him a recent Russian book I had just obtained on the evaluation of determinants. This discussion reminded George of the tale he describes in Section 5 of [38], and simultaneously, unknown to me at the time, he was studying the Bender-Knuth paper [59] which reduced MacMahon’s then 75 year old conjecture on symmetric plane partitions to the following identity:
If
\begin{equation}
g_j(q) = \prod_{i=1}^{s} \left\{ \frac{(1 - q^{j+2i-1})}{(1 - q^{2i-1})} \prod_{h=i+1}^{s} \frac{(1 - q^{2(j+i+h-1)})}{(1 - q^{2(i+h-1)})} \right\},
\end{equation}
then
\[ g_{2n}(q) = \det(C_{i-j} + C_{i+j-1})_{n \times n}, \]
and
\begin{equation}
g_{2n+1}(q) = \left[ \prod_{i=1}^{m} (1 - q^{2i-1}) \right] \det(C_{i-j} - C_{i+j})_{n \times n},
\end{equation}
with
\begin{equation}
C_k = q^{k^2} \binom{2m}{m+k}_2.
\end{equation}
\[
\binom{N}{M}_r \text{ is the Gaussian polynomial (or } q\text{-binomial coefficient) defined by}
\]
\[
\binom{N}{M}_r = \begin{cases}
\frac{(1 - q^{Nr})(1 - q^{(n-1)r}) \cdots (1 - q^{(N-M+1)r})}{(1 - q^{Mr})(1 - q^{(M-1)r}) \cdots (1 - q^r)}, & 0 < M \leq N; \\
1, & M = 0; \\
0, & M < 0, \ M > N.
\end{cases}
\]
This problem so consumed him that, apart from his appearances at our seminar, I saw almost nothing of him throughout October, 1975. Fortunately he was able to prove the MacMahon conjecture during that month [20], [22] and his interest in Hahn’s paper resumed.
The seminar yielded a number of joint papers, for example [39], [40], and [41]. Probably [39] and [41] are most representative of our work. In [39] we developed the full solution of the connection coefficient problem for little \( q \)-Jacobi polynomials. Namely, if
\[
p_n(x; \alpha, \beta|q) = \sum_{j=0}^{n} \frac{(q^{-n}; q)_j (\alpha \beta q^{n+1}; q)_j q^j x^j}{(q; q)_j (\alpha q; q)_j},
\]
then
\[
p_n(x; \gamma, \delta|q) = \sum_{k=0}^{n} a_{k,n} p_k(x; \alpha, \beta|q),
\]
where
\[
a_{k,n} = \frac{(-1)^k q^{k(k+1)/2} (\gamma \delta q^{n+1}; q)_k (q^{-n}; q)_k (\alpha q; q)_k}{(q; q)_k (\gamma q; q)_k (\alpha \beta q^{k+1}; q)_k}
\]
\[
\times \sum_{j=0}^{n-k} \frac{(q^{-n+k}; q)_j (\gamma \delta q^{n+k+1}; q)_j (\alpha q^{k+1}; q)_j q^j}{(q; q)_j (\gamma q^{k+1}; q)_j (\alpha \beta q^{2h+w}; q)_j}.
\]
From here it is a simple matter to deduce Watson’s \( q \)-analog of Whipple’s theorem (namely (5.1)). This was all based on the analogous results for the classical Jacobi polynomials [55; p. 63].
This inexorably led George to a mild generalization in [23] and eventually to the Bailey chains [26], a powerful method that has its genesis in a theorem of Bailey [58]. It was George’s good fortune that Bailey was so diffident about his result that he only gave the recipe for it rather than displaying it and realizing its power.
In the next section, I shall describe the most bizarre event connected with George’s year in Madison.
### 7. Ramanujan’s Lost Notebook.
In the spring of 1976, Dominique Foata invited George to speak at the Table Ronde, Combinatoire et Représentation du Groupe Symétrique to
be held in Strasbourg on April 26–30, 1976. George felt that his proof of MacMahon’s conjecture was old news by now and that our joint work on $q$-analogs of the classical orthogonal polynomials was not ready for presentation.
He decided to prove the Bender-Knuth conjecture, a conjecture related to MacMahon’s conjecture. Basil Gordon had announced a proof of the Bender-Knuth conjecture but did not publish anything on it until 1983 [69] and George assumed that his own methods would at least be novel. This was a dismaying prospect; I could envision him effectively disappearing for another month, if not more. Fortunately he took the approach of proving that Bender-Knuth and MacMahon were equivalent, a task that only took a few days [21].
As the time of the conference came closer, fate, in the guise of international airline fare irrationality, took a hand. In the spring of 1976, if you stayed in Europe at least 3 weeks, you could purchase a ticket for only a fraction of the amount required for any shorter stay. George asked for and received permission to stay in Europe for two weeks after the conference. He laid out an itinerary that included talks in Paris and Southampton, and a visit to Lucy Slater in Cambridge. Slater had told him about boxes deposited in the Trinity College Library which contained papers from the estate of the late G. N. Watson, the English analyst. This seemed at the time to be a rather minor aspect of his trip. Watson was a good analyst and had done good work (after all, he was the Watson of Whittaker and Watson); however, it would have been overly optimistic to expect to find much in these boxes. To his surprise, in one of the boxes was a 100+ page manuscript in Ramanujan’s inimitable handwriting [22].
In his own contribution to this volume, George has told the story of his discovery, so I won’t repeat it here. I first found out about it the day he arrived back in Madison. “How did the trip go?” I asked. “Pretty well,” he said. “I have in my briefcase, a Xerox of a 100+ page manuscript in Ramanujan’s handwriting. I’m charging 25¢ a peek!”
It would fill most of this volume if I were to recount in any detail the cornucopia of results that flowed from the Lost Notebook. George provided a survey in his introduction to the published version of the Lost Notebook [29] in 1988. Currently he and Bruce Berndt are collaborating on a fully edited version of the Lost Notebook.
A couple of summers later, George stopped in Madison on his way to the summer math meetings where he was to talk on the Lost Notebook. He gave a general talk and a specialized talk in Madison. At the second of these, there were six to eight people in the room and all of them knew a reasonable amount about $q$-series. I told George that this would probably be the largest audience he would have of people who knew a lot about basic hypergeometric series, so he could use the standard notation without fear.
Little did either of us know how this field would develop, so that now an audience of 50 experts is not uncommon.
8. The Mock Theta Function and Bailey Chain.
I have already touched on the themes of Bailey chains and Ramanujan’s Lost Notebook. In the early 80’s, George started substantial use of computer algebra packages. This combined with the Bailey chains led to real breakthroughs in the study of mock theta functions.
The study of mock theta functions began with Ramanujan’s last letter to Hardy in January, 1920, four months before he died. Here are a few excepts from that [80; pp. 354–355].
“If we consider a $\psi$-function in the transformed Eulerian form, e.g.,
\begin{align*}
(A) & \quad 1 + \frac{q}{(1-q)^2} + \frac{q^4}{(1-q)^2(1-q^2)^2} + \frac{q^9}{(1-q)^2(1-q^2)^2(1-q^3)^2} + \cdots, \\
(B) & \quad 1 + \frac{q}{1-q} + \frac{q^4}{(1-q)(1-q^2)} + \frac{q^9}{(1-q)(1-q^2)^2(1-q^3)} + \cdots,
\end{align*}
and determine the nature of the singularities at the points
\[ q = 1, q^2 = 1, q^3 = 1, q^4 = 1, q^5 = 1, \ldots, \]
we know how beautifully the asymptotic form of the function can be expressed in a very neat and closed exponential form. For instance, when \( q = e^{-t} \) and \( t \to 0 \),
\begin{align*}
(A) &= \sqrt{\left(\frac{t}{2\pi}\right)} \exp \left(\frac{\pi}{6t} - \frac{t}{24}\right) + o(1), \\
(B) &= \sqrt{\left(\frac{2}{5-\sqrt{5}}\right)} \exp \left(\frac{\pi}{15t} - \frac{t}{60}\right) + o(1),
\end{align*}
and similar results at other singularities.
If we take a number of functions like (A) and (B), it is only in a limited number of cases the terms close as above; but in the majority of cases they never close as above. For instance, when \( q = e^{-t} \) and \( t \to 0 \),
\begin{align*}
(C) & \quad 1 + \frac{q}{(1-q^2)} + \frac{q^3}{(1-q^2)(1-q^2)^2} + \frac{q^6}{(1-q^2)(1-q^2)^2(1-q^3)^2} + \cdots \\
&= \sqrt{\left(\frac{t}{2\pi\sqrt{5}}\right)} \exp \left[\frac{\pi^2}{5t} + a_1 t + a_2 t^2 + \cdots + O(a_k t^k)\right],
\end{align*}
where $a_1 = 1/8\sqrt{5}$, and so on. The function (C) is a simple example of a function behaving in an unclosed form at the singularities.
Now a very interesting question arises. Is the converse of the statements concerning the forms (A) and (B) true? That is to say: Suppose there is a function in the Eulerian form and suppose that all or an infinity of points are exponential singularities, and also suppose that at these points the asymptotic form of the function closes as neatly as in the cases of (A) and (B). The questions is: Is the function taken the sum of two functions one of which is an ordinary $\vartheta$-function and the other a (trivial) function which is $O(1)$ at all the points $e^{2m\pi i/n}$? The answer is \textit{it is not necessarily so}. When it is not so, I call the function a Mock $\vartheta$-function. I have not proved rigorously that \textit{it is no necessarily so}. But I have constructed a number of examples in which it is inconceivable to construct a $\vartheta$-function to cut out the singularities of the original function. Also I have shown that if \textit{it is necessarily so} then it leads to the following assertion—viz. it is possible to construct two power series in $x$, namely $\sum a_n x^n$ and $\sum b_n x^n$, both of which have \textit{essential singularities} on the unit circle, are convergent when $|x| < 1$, and tend to \textit{finite limits at every point} $x = e^{2r\pi i/s}$, and that at the same time the limit of $\sum a_n x^n$ at the point $x = e^{2r\pi i/s}$ is equal to the limit of $\sum b_n x^n$ at the point $x = e^{-2r\pi i/s}$.
This assertion seems to be untrue. Anyhow, we shall go to the examples and see how far our assertions are true.”
Ramanujan concludes the letter with a list of mock theta functions together with identities satisfied by them. In G. N. Watson’s LMS Presidential Address [84], he provides a method (relying on (5.1)) for a deep analysis of one collection of mock theta function (those that Ramanujan named “third order”). However Watson failed to produce an analysis of any comparable depth for the fifth order and seventh order functions.
In the Lost Notebook, George found a number of identities which would provide the missing analysis. For example, if $\phi_0(q)$ defined by
$$\phi_0(q) = 1 + \sum_{n=1}^{\infty} q^{n^2}(1+q)(1+q^3)\cdots(1+q^{2n-1})$$
is one of the fifth-order functions, then in the “lost” notebook we find a result equivalent to
$$\phi_0(-q) = \prod_{n=0}^{\infty} \frac{(1-q^{5n+5})(1+q^{5n+2})(1+q^{5n+3})}{(1-q^{10n+2})(1-q^{10n+8})}$$
$$+ 1 - \sum_{n=0}^{\infty} \frac{q^{5n^2}}{(1-q)(1-q^6)\cdots(1-q^{5n+1})(1-q^4)(1-q^9)\cdots(1-q^{5n-1})}.$$
It follows immediately by an application of (5.1), that
\[
\phi_0(-q) = \prod_{n=0}^{\infty} \frac{(1-q^{5n+5})(1+q^{5n+2})(1+q^{5n+3})}{(1-q^{10n+2})(1-q^{10n+8})}
\]
\[
+ 1 - \prod_{n=0}^{\infty} (1-q^{5n+5})^{-1} \left\{ \frac{1}{1-q} + (1-q^{-1}) \sum_{n=1}^{\infty} \frac{(-1)^n q^{n(15n+5)/2}(1+q^{5n})}{(1-q^{5n+1})(1-q^{5n-1})} \right\}.
\]
This and similar identities for the other fifth order mock theta functions were central to their study as George noted [22].
The key to unlocking such formulas lay in a subtle application of the Bailey chain. George has given an account of the basic properties of the chain in Some Debts I Owe; so I will restrict myself to one portion of the study. Namely the objects he calls Bailey pairs. Sequences of functions \( \{\alpha_n\} \) and \( \{\beta_n\} \) satisfying
\[
\beta_n = \sum_{r=0}^{n} \frac{\alpha_r}{(q;q)_{n-r}(q;q)_{n+r}}.
\]
The pair key to the understanding of \( \phi_0(q) \) is
\[
\beta_n = \frac{(-1)^n q^{-n(n-1)/2}}{(q;q)_n}
\]
and
\[
\alpha_n = q^{n^2+n} \sum_{j=-n}^{n} (-1)^j q^{-j(3j+1)/2} - q^{n^2-n} \sum_{j=1-n}^{n-1} (-1)^j q^{-j(3j+1)/2}.
\]
The form of \( \alpha_n \) is sufficiently surprising not to mention complicated that without the help of SCRATCHPAD (a.k.a. AXIOM) to compute many \( \alpha_n \)'s, these discoveries never would have occurred.
From this point on, Dean Hickerson played a vital role eventually proving all the Mock Theta conjectures [73] and proving comparable theorems for the seventh order functions [74].
9. Physics.
George’s collaborations with physicists began with Rodney Baxter and Peter Forrester in [46]; the resulting model, generalizing Baxter’s Hard Hexagon Model, is succinctly called the ABF Model.
The mathematics background that George brought to bear on this is best laid out in his only single author physics publication [25]. Here he observes
that a number of the functions produced by the method of Corner Transfer Matrices are limits of nice polynomials. The prototype example is Schur’s theorem [81].
If $D_0 = D_1 = 1$, and $D_n = D_{n-1} + q^{n-1}D_{n-2}$ for $n \geq 2$, then
$$D_n = \sum_{\lambda=-\infty}^{\infty} (-1)^{\lambda} q^{\lambda(5\lambda+1)/2} \left[ \frac{n}{\lfloor \frac{n-5\lambda}{2} \rfloor} \right]$$
where $\lfloor x \rfloor$ is the greatest integer in $x$ and $\left[ \begin{array}{c} A \\ B \end{array} \right]$ is the familiar Gaussian polynomial defined in (6.4).
George had already studied generalizations of Schur’s theorem in [12] and [13]. It turned out that the ABF model could be treated by an analysis of polynomials similar in nature to Schur’s polynomial version of the Rogers-Ramanujan identities.
In a subsequent collaboration with Baxter [45], they discover $q$-analogs of the trinomial numbers. The latter are the entries in the following table where each entry is the sum of the 3 entries directly above it
\[
\begin{align*}
&1 \\
&1 \quad 1 \quad 1 \\
&1 \quad 2 \quad 3 \quad 2 \quad 1 \\
&1 \quad 3 \quad 6 \quad 7 \quad 6 \quad 3 \quad 1 \\
&1 \quad 4 \quad 10 \quad 16 \quad 19 \quad 16 \quad 10 \quad 4 \quad 1 \\
&- \quad - \quad - \quad - \quad - \quad - \quad - \quad - \quad - \\
&- \quad - \quad - \quad - \quad - \quad - \quad - \quad - \quad - \quad -
\end{align*}
\]
An example of the polynomials in question is [43; p. 299]
$$\left( \begin{array}{c} n; B; q \\ A \end{array} \right)_2 = \sum_{j \geq 0} \frac{q^{j(j+B)}(q;q)_n}{(q;q)_j(q;q)_{j+A}(q;q)_{n-2j-A}}.$$
Besides solving the model with Baxter in [43], [44] and [45], George found a variety of applications including a full explanation of a mathematical mystery that had been called by Euler: “A remarkable example of misleading induction.” [31]. More recently he has worked with physicists A. Berkovich [47] and A Schilling and O. Warnaar [54] on further extensions of the Bailey chain.
10. The Crank.
There are many sides to George Andrews. The one which will probably have the most long lasting impact is the problem solver. His ability in this regard can be illustrated in many ways. Here is one instance of what happened when he felt challenged in an area that most of us think of as his.
Ramanujan discovered a number of very surprising congruences for the number of partitions of some infinite families of numbers. There were three infinite families, with the first of each family being the following:
\begin{align*}
(10.1) & \quad p(5n + 4) \equiv 0 \pmod{5} \\
(10.2) & \quad p(7n + 5) \equiv 0 \pmod{7} \\
(10.3) & \quad p(11n + 6) \equiv 0 \pmod{11}
\end{align*}
For the first two of these congruences, Freeman Dyson [61] discovered a combinatorial reason for the existence of these facts, and his conjecture was proven by Atkin and Swinnerton-Dyer [3]. The statistic found by Dyson did not work in the third case, so he expressed a hope that another statistic could be found. These names were appropriate, “rank” for the one he found, and “crank” for the one still undiscovered one. Over 40 years later, Frank Garvan, one of George’s Ph.D. students, found a pseudo crank, and talked about this at the Ramanujan meeting in Urbana in 1987. Garvan felt that there was a real version of this unknown statistic, and told a number of people about an identity which he felt was the key.
George was struck by Frank’s observation that the pseudo crank generating function
\begin{equation}
\prod_{n=1}^{\infty} \frac{(1 - q^n)}{(1 - zq^n)(1 - z^{-1}q^n)}
\end{equation}
has only one negative coefficient (that of $z^0 q^1$). Previously they had assumed that the appearance of one negative coefficient suggested that negative coefficients would abound. Since the specialization $z = 1$ in (10.1) produced
\begin{equation}
\prod_{n=1}^{\infty} \frac{1}{1 - q^n} = \sum_{n \geq 0} p(n)q^n,
\end{equation}
Frank’s observation suggests strongly that the pseudo crank generating function might indeed generate the crank at least for $n > 1$.
On Saturday, June, 1987, the day after the Ramanujan meeting, George undertook a melancholy journey to Onarga, Illinois to visit the graves of his parents (who were born in the mid-west and chose to be buried there
even though they spent all their adult lives in Oregon). He returned to Urbana in the early afternoon in a very somber mood. He hoped to discuss mathematics with a few people who had remained after the conference, but no one was around in the dormitory where he was staying. To pull himself out of the doldrums he sat down to study (10.4) with the hope of tracking down the crank.
By the early evening, he had found the crank [49; p. 168].
Now he faced a nonmathematical problem. He was low on cash, had no phone card and only had access to pay phones. How could he let Frank know? He proceeded to call his wife collect. “I want you to call Richard Askey who will know Frank Garvan’s phone number. I want you to say that I would like to write a joint paper with Frank in which we show that the crank of a partition is given by: [he then read the definition of the crank symbol by symbol].”
This provided the first crank. It should be noted that further cranks (i.e. partition statistics that provide combinatorial interpretations of (10.3) were found by Garvan, Kim and Stanton, [63] and that Dyson [62] provided many further insights about the Garvan-Andrews crank.
11. Conclusion.
It would be incorrect to conclude that the bulk of George’s research concluded in the 1980’s. Indeed a full account of his work in the 1990’s would perhaps require another paper comparable to this one. I shall only mention a few of his themes refer you to the literature. It’s not clear which of his current projects will have staying power similar to those I have already described. Also the breadth of projects widens partially due to the fact that he is undertaking many more collaborations now than in the past; indeed 27 of his 44 lifetime collaborators have written papers with him in the 1990’s.
His interest in partition identities sparked a continuing collaboration with K. Alladi that began with [2].
The Liouville mystery [37] (referred to in Some Debts I Owe) is essentially work on generalized Lambert series and relates to his work with Crippa and Simon [30].
His Pfaff Trilogy as he calls it ([34], [35] and [36]) is both part of his continuing interest in computer algebra methods and applications to plane partitions.
The papers with the Knopfmachers (beginning with [50]) on generalizations of the Engel expansion suggest a try new line of research. The idea here is to produce an algorithm to expand an infinite product or modular form into an Eulerian or $q$-series. If this method can be expanded it may well take its place as perhaps the converse of Euler’s ancient algorithm [19; p. 98] for obtain infinite product representations of generating functions.
Also in this volume we find one of his papers (joint with P. Paule) [52] on the computer algebra implementation of the Partition Analysis of P. A. MacMahon. This project clearly points beyond MacMahon’s horizon in that the authors have observed and implemented the fact that Partition Analysis is a purely algorithmic process. The success of George’s work on the Omega Package (joint with Paule and Riese [51], [52], [53]) suggests a number of further refinements and applications.
There is much more to the story and I have probably left out a number of George’s favorite items. This is to be expected. The topics that interested me most are the ones I can most easily discuss.
I want to express my thanks to George. First, he provided some of the details in this paper. I remember the start of his April 1 lecture in Madison, but not the specific formulas which were given above. He provided them and some other facts. More importantly, he taught me about basic hypergeometric series. My mathematical life would have been significantly different without his teaching. There are quite a few people who could say the same, their mathematical life would have been poorer without the aid which George Andrews provided them.
REFERENCES
1. H. L. Alder, *The nonexistence of certain identities in the theory of partitions and compositions*, Bull. Amer. Math. Soc. **54** (1948), 712–722.
2. K. Alladi, G. E. Andrews and B. Gordon, *Generalizations and refinements of a partition theorem of Göllnitz*, J. reine und angew. Math. **460** (1995), 165–188.
3. A. O. L. Atkin and H. P. F. Swinnerton-Dyer, *Some properties of partitions*, Proc. London Math. Soc. (3) **4** (1953), 84–106.
4. G. E. Andrews, *On basic hypergeometric series, mock theta functions, and partitions, I*, Quart. J. Math. **17** (1966), 64–80.
5. ———, *On basic hypergeometric series, mock theta functions, and partitions, II*, Quart. J. Math. **17** (1966), 132–143.
6. ———, *q-identities of Auluck, Carlitz, and Rogers*, Duke Math. J. **33** (1966), 575–582.
7. ———, *A generalization of the Gollnitz-Gordon partition theorems*, Proc. Amer. Math. Soc. **8** (1967), 945–952.
8. ———, *On q-difference equations for certain well-poised basic hypergeometric series*, Quart. J. Math. **19** (1968), 433–447.
9. ———, *A generalization of the classical partition theorems*, Trans. Amer. Math. Soc. **145** (1968), 205–221.
10. ———, *On the foundations of combinatorial theory, V.: Eulerian differential operators*, Studies in Applied Math **50** (1971), 345–375.
11. ———, *Summations and transformation for basic Appell series*, J. London Math. Soc. **4(2)** (1972), 618–622.
12. ———, *Sieves for theorems of Euler, Rogers and Ramanujan*, Lecture Notes in Mathematics #251, Springer-Verlag, NY, (1972) pp. 1–20.
13. ———, *Sieves in the theory of partitions*, Amer. J. Math. **94** (1972), 1214–1230.
14. ———, *Partition identities*, Advances in Math. **9** (1972), 10–51.
15. ———, *On the general Rogers-Ramanujan theorem*, Memoir. Amer. Math. Soc. **152** (1974), 86.
16. ———, *Applications of basic hypergeometric functions*, SIAM Rev. **16 (4)** (1974), 441–484.
17. ———, *An analytic generalization of the Rogers-Ramanujan identities for odd moduli*, Proc. Nat. Acad. Sci. **71 (10)** (1974), 4082–4085.
18. ———, *Problems and prospects for basic hypergeometric functions*, Theory and Application of Special Functions, R. Askey, ed., Academic Press, NY, (1975) pp. 191–214.
19. ———, *The Theory of Partitions*, The Encyclopedia of Mathematics and Its Applications Series, Addison-Wesley Pub. Co., NY, (1976) pp. 300. Reissued, Cambridge University Press, New York, 1998.
20. ———, *MacMahon's conjecture on symmetric plane partitions*, Proc. Nat. Acad. Sci. **74 (2)** (1977), 426–429.
21. ———, *Plane partitions, II: The equivalence of the Bender-Knuth and MacMahon conjectures*, Pacific J. Math. **72 (2)** (1977), 283–291.
22. ______, *An introduction to Ramanujan’s “lost” notebook*, Amer. Math. Monthly **86** (2) (1979), 89–108.
23. ______, *Connection coefficient problems and partitions*, Proc. Symp. in Pure Math. **34** (1979), 1–24.
24. ______, *Plane partitions, III: The weak Macdonald conjecture*, Invent. Math. **53** (1979), 193–225.
25. ______, *The hard-hexagon model and the Rogers-Ramanujan type identities*, Proc. Natl. Acad. Sci. **78** (1981), 5290–5292.
26. ______, *Multiple series Rogers-Ramanujan type identities*, Pac. J. Math. **114** (2) (1984), 267–283.
27. ______, *The fifth and seventh order mock theta functions*, Trans. Amer. Math. Soc. **293** (1) (1986), 113–134.
28. ______, *Plane partitions, IV: A conjecture of Mills-Robbins-Rumsey*, Aequationes Mathematicae **33** (1987), 230–250.
29. ______, *Introduction to Srinivasa Ramanujan: The Lost Notebook and Other Unpublished Papers*, Narosa, New Delhi (1987).
30. ______, *Mock theta functions*, Proc. Symposia in Pure Math. **49** (1989), 283–298.
31. ______, *Euler’s “Exemplum Memorabile Inductionis Fallacis” and q-trinomial coefficients*, J. Amer. Math. Soc. **3** (1990), 653–669.
32. ______, *Bailey chains and generalized Lambert series, I: Four identities of Ramanujan*, Illinois J. Math. **36** (1992), 251–274.
33. ______, *Plane partitions, V: The T.S.S.C.P.P. conjecture*, J. Combinatorial Th. (A) **66** (1) (1994), 28–39.
34. ______, *Pfaff’s Method (II): Diverse applications*, J. Computational & Appl. Math. **68** (1996), 15–23.
35. ______, *Pfaff’s Method (III): Comparison with the WZ method*, Electronic J. Combin. (Foata Festschrift) **3** (2): R21 (1996), 18.
36. ______, *Pfaff’s Method (I): The Mills-Robbins-Rumsey determinant*, Discrete Math. **193** (1998), 43–60.
37. ______, *Three-quadrant Ferrers graphs*, (submitted to volumes for the B. N. Prasad Centenary Commemoration, Allahabad Math. Society).
38. ______, *Some debts I owe*, (submitted to Proceedings of 42nd Séminaire Lotharingien de Combinatoire, held in my honor at Maratea, Italy, September, 1998).
39. ______ (with R. Askey), *Enumeration of partitions: The role of Eulerian series and q-orthogonal polynomials*, Higher Combinatorics, M. Aigner, ed., Reidell Publ. Co., Dordrecht, Holland, (1977) pp. 3–26.
40. ______ (with R. Askey), *A simple proof of Ramanujan’s $\psi_1$ summation*, Aequa. Math. **18** (1978), 333–337.
41. ______ (with R. Askey), *Another q-extension of the $\beta$-function*, Proc. Amer. Math. Soc. **81** (1) (1981), 97–100.
42. ______ (with R. Askey), *Classical orthogonal polynomials*, Proc. Conf. on Orthog. Polys. at Bar-le duc, Lecture Notes in Math., Springer, Berlin, **1171** (1985) pp. 36–62.
43. ______ (with R. J. Baxter), *Lattice gas generalization of the hard hexagon model, I: Star triangle relation and local densities*, J. Stat. Phys. **44** (1/2) (1986), 259–271.
44. ______ (with R. J. Baxter), *Lattice gas generalization of the hard hexagon model. II. The local densities as elliptic functions*, J. Stat. Phys. **44** (1986), 713–728.
45. ______ (with R. J. Baxter), *Lattice gas generalization of the hard hexagon model. III. q-trinomial coefficients*, J. Stat. Phys. **47** (3/4) (1987), 297–330.
46. ______ (with R. J. Baxter and P. J. Forrester), *Eight-vertex SOS model and generalized Rogers-Ramanujan-type identities*, J. Stat. Phys. **35** (1984), 193–266.
47. ______ (with A. Berkovich), *A trinomial analogue of Bailey’s lemma and $N = 2$ superconformal invariance*, Comm. in Math. Physics **192** (1998), 245–260.
48. ______ (with D. Crippa and K. Simon), *q-series arising from the study of random graphs*, S.I.A.M. J. Discrete Math. **10 (1)** (1997), 41–56.
49. ______ and F. G. Garvan, *Dyson’s crank of a partition*, Bull. Amer. Math. Soc. **18** (1988), 167–171.
50. ______ (with A. and J. Knopfmacher), *Engel expansions and the Rogers-Ramanujan identities*.
51. ______ (with P. Paule and A. Riese), *MacMahon’s partition analysis III: The omega package*.
52. ______ (with P. Paule), *MacMahon’s partition analysis IV: Summation of series*.
53. ______ (with P. Paule), *Magic squares and partition analysis*, (in preparation).
54. ______ (with O. Warnaar and A. Schilling), *An $A_2$ Bailey lemma and Rogers-Ramanujan-type identities*, Accepted for publication J. Amer. Math. Soc..
55. R. Askey, *Orthogonal Polynomials and Special Functions*, Regional Conf. Series in Applied Math., No. 22, S.I.A.M., Philadelphia, 1975.
56. R. Askey and S. Wainger, *A transplantation theorem for ultraspherical coefficients*, Pac. J. Math. **16** (1966), 393–405.
57. W. N. Bailey, *Generalized Hypergeometric Series*, 1935, Cambridge, London and New York (reprinted: Hafner, New York, 1964).
58. ______, *Identities of the Rogers-Ramanujan type*, Proc. London Math. Soc. (2) **50** (1949), 1–10.
59. E. A. Bender and D. E. Knuth, *Enumeration of plane partitions*, J. Comb. Th., **13** (1972), 40–54.
60. F. Dyson, *Three identities in combinatory analysis*, J. London Math. Soc. **18** (1943), 35–39.
61. F. J. Dyson, *Some guesses in the theory of partitions*, Eureka (Cambridge) **8** (1944), 10–15.
62. F. J. Dyson, *Mappings and symmetries of partitions*, J. Comb. Th. (A).
63. F. Garvan, D. Kim and D. Stanton, *Cranks and t-cores*, Inv. Math. **101** (1990), 1–17.
64. H. Göllnitz, *Einfache Partitionen*, (unpublished), Diplomarbeit, W. S. 1960, Göttingen, 65 pp.
65. ______, *Partitionen mit Differenzenbedingungen*, Dissertation, Göttingen, 1963, ii + 62 pp..
66. ______, *Partitionen mit Differenzenbedingungen*, J. Reine. Angew. Math. **225** (1967), 154–190.
67. B. Gordon, *A combinatorial generalization of the Rogers-Ramanujan identities* **83** (1961), 393–399.
68. ______, *Some continued fractions of the Rogers-Ramanujan type*, Duke Math. J. **31** (1965), 741–748.
69. ______, *A proof of the Bender-Knuth conjecture*, Pac. J. Math. **108** (1983), 99–113.
70. H. W. Gould, *Combinatorial Identities*, West Virginia University, Morgan.
71. W. Hahn, *Über Orthogonalpolynome, die q-Differenzengleichungen genügen*, Math. Nachr. Berlin **2** (1949), 4–34.
72. G. H. Hardy and E. M. Wright, *Introduction to the Theory of Numbers*, 4th ed., Oxford University Press, London and New York, 1960.
73. D. Hickerson, *A proof of the mock theta conjectures*, Inv. Math **94** (1988), 639–660.
74. ______, *On the seventh order mock theta functions*, Inv. Math. **94** (1988), 661–677.
75. W. J. Holman III, L. C. Biedenharn and J. D. Louck, *On hypergeometric series well-poised in $SU(n)$*, S.I.A.M. J. Math. Anal. **7** (1976), 529–541.
76. I. G. Macdonald, *Affine root systems and Dedekind’s $\eta$-function*, Inv. Math. **15** (1972), 91–143.
77. ———, *Some conjectures for root systems*, S.I.A.M. J. Math. Anal. **13** (1982), 988–1007.
78. S. Milne, *A $q$-analog of hypergeometric series well-poised in $SU(n)$ and invariant $G$-functions*, Adv. Math..
79. H. Rademacher, *Lectures on Analytic Number Theory*, Tata Institute, Bombay, 1954–1955.
80. S. Ramanujan, *Collected Papers*, Cambridge University Press, London and New York, 1927 (Reprinted: Chelsea, New York 1962).
81. I. Schur, *Ein Beitrag zur additiven Zahlentheorie und zur Theorie der Kettenbrüche*, S. B. Preuss, Akad. Wiss. Phys.-Math. Kl. 1917, pp. 302–321. (Reprinted in I. Schur, Gesammelte Abhandlungen, Vol. 2, pp. 117–136, Springer, Berlin, 1973).
82. W. Schwarz, *Review 1179*, Math Reviews **32** (1966), 202–203.
83. A. Selberg, *Über einige arithmetische Identitäten*, Avhl. Norske Vid. **8** (1936), 23.
84. G. N. Watson, *The final problem*, J. London Math. Soc. **11** (1936), 55–80.
85. ———, *The mock theta functions (2)*, Proc. London Math. Soc. (2) **42** (1937), 274–304.
86. D. Zeilberger and D. M. Bressoud, *A proof of Andrews’ $q$-Dyson conjecture*, Discrete Math. **54** (1985), 201–224.
|
<urn:uuid:2251d3ea-c8a6-4464-a4aa-7bf0ef097911>
|
CC-MAIN-2018-47
|
http://www.emis.ams.org/journals/SLC/wpapers/s42askey.pdf
|
2018-11-18T12:52:17Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744368.74/warc/CC-MAIN-20181118114534-20181118135810-00019.warc.gz
| 392,550,704
| 16,920
|
eng_Latn
|
eng_Latn
| 0.815719
|
eng_Latn
| 0.980691
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"mlt_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
1387,
3360,
5594,
8035,
10585,
13201,
14660,
16196,
18226,
20967,
22998,
25212,
28153,
30156,
32835,
34715,
36690,
38966,
41638,
42863,
45553,
48947,
52166,
53423
] |
Changes in child and family policies in the EU28 in 2017
European Platform for Investing in Children: Annual thematic report
EUROPEAN COMMISSION
Directorate-General for Employment, Social Affairs and Inclusion
Directorate C – Social Affairs
Unit C3 — Disability & Inclusion
Contact: Julius op de Beke
E-mail: [email protected]
European Commission
B-1049 Brussels
Changes in child and family policies in the EU28 in 2017
European Platform for Investing in Children: Annual thematic report
Written by Barbara Janta, Eleftheria Iakovidou and Milda Butkute, RAND Europe
July 2018
Europe Direct is a service to help you find answers to your questions about the European Union.
Freephone number (*):
00 800 6789 10 11
(*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you).
LEGAL NOTICE
This document has been prepared for the European Commission however it reflects the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
More information on the European Union is available on the Internet (http://www.europa.eu).
Luxembourg: Publications Office of the European Union, 2018
ISBN 978-92-79-91263-4
doi: 10.2767/14467
Catalogue number : KE-01-18-829-EN-N
© European Union, 2018
Reproduction is authorised provided the source is acknowledged.
# Contents
CHAPTER 1: INTRODUCTION ................................................................................................................. 7
CHAPTER 2: EUROPEAN PILLAR OF SOCIAL RIGHTS – THE DIRECTION OF FUTURE CHANGES IN CHILD AND FAMILY POLICY IN THE EU .......................................................... 9
CHAPTER 3: CHANGES IN FORMAL CHILDCARE PROVISION ....................................................... 13
CHAPTER 4: DEVELOPMENTS IN EU MEMBER STATES IN THE AREA OF MIGRANT AND REFUGEE CHILDREN POLICIES ...................................................................................... 17
CHAPTER 5: CHANGES IN PARENTAL AND PATERNITY LEAVE POLICIES AND PROVISIONS .................................................................................................................................................. 20
CHAPTER 6: CHANGES IN MATERNITY LEAVE POLICIES AND PROVISIONS IN EUROPE ........ 24
CHAPTER 7: DEINSTITUTIONALISATION OF CHILD CARE SERVICES IN EUROPE .................... 27
CONCLUSION ..................................................................................................................................... 29
ENDNOTES ........................................................................................................................................... 30
CHAPTER 1: INTRODUCTION
The year 2017 marked a number of important developments in the area of child and family policy in Europe. The presentation of the European Pillar of Social Rights has set the framework for new legislative and policy actions to combat some of the key challenges facing European children and their families. In addition, the preparatory action for the Child Guarantee scheme for vulnerable children outlined the need for an integrated approach to tackle multidimensional aspects of child poverty.
The aim of this annual thematic report, drafted as part of the European Platform for Investing in Children (EPIC) project, is to outline changes and new developments during the past year in the area of child and family policies across the EU Member States (MS). The report is aligned with the 2013 Recommendation ‘Investing in Children: breaking the cycle of disadvantage’ and its key indicators to measure progress across the policy areas relevant for each of the three pillars of the Recommendation. The report is also guided by recent developments related to the European Pillar of Social Rights. As such, this report provides an overview of the direction of policy developments in this area.
Methodology and data used
The report draws on the data and information collected during the process of updating the national profiles featured on the EPIC website. National profiles are an important tool to report on family policy trends and changes at national level, and to monitor progress made towards the implementation of the Recommendation, as well as to map how common certain practices are in a particular country. EPIC national profiles are refreshed on an annual basis. Information used for this report builds on the recent round of national profile updates conducted during the winter months of 2017 and 2018.
The EPIC project team at RAND Europe worked in close collaboration with national experts across MS to collect relevant information and data. All national profiles are structured in accordance with a common reporting template, requiring experts to provide information on current policy objectives, legislation, programmes, initiatives and other measures covering the past 12 months in relation to the three pillars of the Recommendation. Nevertheless, national experts have flexibility in reporting information, thus there is variation in the content, length and breadth of information available for each MS country profile. This variability is also reflected in our report when we outline the policy changes across European countries. As such, information on some topics is sometimes covered in more depth for some Member States than in others. And on a few occasions, information is not available for some countries at all. The report should be read with this caveat in mind.
Thematic coverage
This report covers common, relevant and reoccurring themes, trends and changes relevant in a number of MS countries. In particular, we selected themes related to the situations of vulnerable children (e.g. migrant children, children residing in institutions, etc.) and the key aspects related to socio-economic disadvantage (e.g. provision of and access to the early childhood education and care services, leave provisions available to parents, etc.). These trends outline current policy objectives, legislation, programmes, initiatives and other measures covering the past 12 months (May 2017 – May 2018) in relation to the three pillars of the Recommendation and relevant aspect of the Pillar of Social Rights. As such, they provide an overview of the
countries’ current policies for children and their families, highlighting significant challenges and how these are being addressed at the MS level.
**Structure of each thematic trend**
For each trend, we first provide background information about relevant policy areas and a short description of drivers for new developments. This is followed by a short description of key policy developments at the EU level. Next, we report on key changes and progress in each of the MS for which the information is available in the EPIC national profiles. A final conclusion summarises key findings, and outlines remaining challenges and potential next steps.
**Report structure**
Chapter 2 reports on key trends as reported in the EPIC national profiles. Chapter 3 provides a reflection on policy developments and key challenges remaining. It also signposts current policy discussions and how they could potentially shape child and family policy at the EU and national levels in coming years. Developments in the area of child migrant and refugee policy are presented in Chapter 4. Chapters 5 and 6 introduce changes in parental, paternity and maternity leave policies in the EU. The progress of deinstitutionalisation of the child care system is presented in Chapter 7.
CHAPTER 2: EUROPEAN PILLAR OF SOCIAL RIGHTS – THE DIRECTION OF FUTURE CHANGES IN CHILD AND FAMILY POLICY IN THE EU
Full enjoyment of economic, social and cultural rights is recognised and protected in several international and regional human rights instruments, and it is one of the key principles of the European Union. In relation to child and family policy, these rights include gender equality, provision of equal opportunities to women and men, the right to access the labour market and to be economically active, the right to fair treatment in employment, and the right to social protection and inclusion.
Following a public consultation,\textsuperscript{iv} in April 2017 the European Commission (EC) presented a formal Recommendation for the European Pillar of Social Rights (EPSR).\textsuperscript{v} The Pillar was later proclaimed by the European Council, European Parliament and by the MS at the Gothenburg summit in Sweden in November 2017. The objective of the Pillar is to contribute to social progress by supporting fair and well-functioning labour markets and welfare systems, and providing a framework for a set of related legislative and non-legislative initiatives in the Pillar’s areas of focus.
The Pillar is based on three main principles:\textsuperscript{vi}
- Equal opportunities and access to the labour market;
- Fair working conditions; and
- Social protection and inclusion.
Several of the 20 key principles of the Pillar are directly relevant for the child and family policies as they build on the principle of the work-life balance (Principle 9 of the Pillar) and the right to childcare and support to children (Principle 11 of the Pillar). This includes a promotion of rights to ‘all people in employment with caring responsibilities’\textsuperscript{vii} to encourage a more equal share of caring responsibilities between women and men, in order to balance professional and family responsibilities. In more detail, this includes the ability to have flexible work arrangements and equal conditions related to leave policies. We provide more detail on aspects related to the equal share of leave arrangement in Chapter 5. Aspects related to childcare and support to children include the right to affordable early childhood education and care of good quality, and the right to protection from poverty and the right to specific measures to enhance equal opportunities. More detail on aspects related to the ECEC provision is provided in Chapter 3.
The EC working document \textit{Monitoring the Implementation of the European Pillar of Social Rights}\textsuperscript{viii} has assessed, monitored, compared, and reported on, the progress of EPSR implementation and new developments across the MS in the areas related to work, private and family life, childcare and support to children.
\textbf{2017- 2018 country-specific recommendations in the area of child and family policies}
The European Semester for policy coordination provides a framework for future policy developments in the Member States, including policy recommendations stemming from the EPSR. As part of the European Semester, every year the European Commission issues country-specific recommendations (CSRs) setting up policy objectives for the next year. While the CSRs are tailored to a specific Member State, they are part of a wider set of EU priorities identified as part of the Annual Growth Survey. The recitals of the CSRs introduce the country-specific context in which the recommendations are made. They provide an overview of the country’s situation in areas covered by the European Semester, including child poverty and well-being. The 2017 recitals provide important policy pointers to strengthen efforts in the particular policy areas in each of the MS. The overview of the 2017 and 2018 CSRs is presented in Table 1.
Table 1 Overview of the 2017 and 2018 European Semester themes for country-specific recommendations and 2017 recitals related to families and children.
| Policy Topic | Countries receiving a family/child recital in 2017 | Countries receiving a family/child CSR in 2017\(^1\) | Countries receiving a family/child CSR in 2018 |
|---------------------------------------------------|-----------------------------------------------------|------------------------------------------------------|-----------------------------------------------|
| Child poverty | BG, IT, RO | | |
| Income support | BG, DE, EE, ES, HU, HR, LV, LT, PT, RO, UK | BG, ES, HU, LV, | BG, ES, LV, LT, HU |
| Efficiency/effectiveness of social protection support | IE, FI, HU, HR, IT, LV, LT | EE, HU, IT, LV, LT, RO (min. wage) | EE, HR, IT, LV, LT, HU, RO (min. wage) |
| ECEC/childcare (access, affordability, quality) | CZ, AT, IE, ES, HR, IT, PL, SK, UK | IE, ES, SK, AT | IE, IT, PL, SK |
| Inclusive education/Early school leaving | AT, BE, BG, DK, ES, FR, HR, LT, MT, PT, RO, SE, SK | BE, CY, AT, ES, FR, LT, LV, BG, HR, HU, RO, SK | BG, CZ, ES, HR, CY, LV, LT, HU, RO, SK |
| Affordable housing | IE, LU, NL, SE, UK | IE | IE, NL, UK |
| Financial disincentives to the labour market | DE, FI, FR(migrants), HU, HR, PL | DE, FR, IT, PL, RO | DE, FR, IT, NL, PL, RO |
| Reconciliation | EE, IT, SK | EE, PL, SK, AT | |
| Access to health | BG, CY, HU, HR, LV, LT, RO | BG, LV, LT, RO, SI (LTC) | BG, CY, LV, LT, RO |
| Roma-related | BG, CZ, HU, RO, SK | BG, HU, RO, SK | BG, HU, RO, SK |
Source: 2018 European Semester: Country-Specific Recommendations / Commission Recommendations\(^6\)
**Social inclusion in the child and family policies in the Member States**
The European Semester thematic factsheet on social inclusion\(^7\) indicates that in 2016, 26.4% of children in the EU were at risk of poverty or social exclusion\(^8\), only 0.9% lower than in 2011. As such, social exclusion and child poverty remain key challenges and priorities of child and family policy across Europe.
---
\(^1\) Greece did not receive any CSRs in 2016-2018 as it was still following macroeconomic adjustment programmes.
To address this challenge, EU Member States have introduced various measures over recent years. For instance, some countries, such as Ireland and Denmark, have introduced **comprehensive national policy frameworks**. In 2014 Ireland adopted ‘Better Outcomes, Brighter Futures: The national policy framework for children and young people 2016–2020’ (BOBF), recognising the life-long consequences of child poverty.\textsuperscript{31} Later, Ireland introduced a new set of strategic priorities for 2015–2017 which has focused on creating a socially inclusive and fair society with safe environments for families and children. These strategic priorities have set a child-specific poverty target...
which is believed to be achieved by an increased investment in evidence-based and effective services. Similarly, a comprehensive preventive measures package, ‘Early support – Lifelong effects’, was adopted by the Danish Parliament in 2014.\textsuperscript{xxv} The aim of this measure was to ensure early and preventive support for disadvantaged children and young people during the 2014-2017 period.\textsuperscript{xxvi} The provisions included strengthened public-private partnerships, supported parental competences, and an increased budget for preventive initiatives to tackle psychiatric issues in children and adolescents.
Other countries, such as Italy, Greece and Poland, introduced \textbf{focused financial policy measures to tackle specific challenges}. For example, a new cash benefit called ‘Family 500 Plus’ was introduced in Poland in April 2016.\textsuperscript{xxvii} This benefit is a universal monthly cash transfer of PLN 500 (equivalent to around €117) paid to families for the second and any consecutive children until they reach the age of 18. Low income families receive benefits for their first child. Families with disabled children are entitled to increased monthly benefits. A financial support measure was also introduced in Italy. In 2017, the Italian Government approved a decree to introduce an Inclusion Income (REI) benefit to tackle poverty, which should increase the total number of beneficiaries to around 400,000 families per year (around 1.7 million people, including 800,000 minors).\textsuperscript{xxviii} Finally, in Latvia specific financial assistance was introduced to support socially disadvantaged children. This support includes increased benefits to children whose parents’ parental rights have been removed and who have consequently been placed under guardianship; transport subsidies to families with two or more children; and family loans for the purchase or construction of family housing.\textsuperscript{xxix}
A \textbf{broad range of financial support initiatives} was launched in Greece. The aim of these measures was to address the inequalities and gaps in the social protection system. Initiatives included the Social Solidarity Income programme, which targets households living in extreme poverty, and The Fund for European Aid to the Most Deprived (FEAD), which supports the distribution of food and commodities.\textsuperscript{xxx} In addition, the National Network of Immediate Social Intervention, which offers social, psychological and material support to people in a state of need, was also introduced in Greece.\textsuperscript{xxxi}
\textit{In sum}
A number of policy frameworks and new initiatives related to children and families have been introduced over recent years across Europe to strengthen support to families. These initiatives may help to bring positive changes to the lives of children and families, though their specific impacts still need to be ascertained. Further, looking at the number of CSRs and recitals as outlined above, there are still numerous challenges across several relevant policy areas that require additional action. Given that many of these aspects are priorities of the European Pillar of Social Rights, we can expect to see more child and family policy developments aimed at combating the remaining challenges.
CHAPTER 3: CHANGES IN FORMAL CHILDCARE PROVISION
Research shows that high-quality early childhood education and care (ECEC) services can have important and enduring impacts on children’s development, their educational outcomes and labour market prospects.\textsuperscript{xxi} The provision of affordable, accessible and high-quality ECEC services is also important for parents’ participation in the labour market.\textsuperscript{xxii}
The importance of the provision of formal ECEC services has been recognised at the EU level since the beginning of this century. At the Barcelona Summit in 2002, the European Council set childcare provision targets. EU Member States agreed to increase the formal childcare provision to ensure that by 2010 at least 33% of children under 3 years of age, and at least 90% of children between 3 and the mandatory school starting age, have access to formal childcare services.\textsuperscript{2}
On average, 32.9% of under 3 year-olds were enrolled in childcare in the EU in 2016.\textsuperscript{xxiii} However, there are considerable differences in enrolment among MS, varying between 50% of children having access to childcare in Denmark, the Netherlands and Portugal, to only 10% in Greece, Poland, the Czech Republic and Slovakia. This suggests that more efforts to invest in ECEC provision are still needed in some MS to reach the Barcelona targets. As for children aged 3 years or above, 83.6%\textsuperscript{xxiv} have access to childcare services. Overall, 12 MS had reached the Barcelona targets in 2016. However, access to childcare for this age group is still less than 65% in Croatia, Greece, Romania and Poland. Figure 2 shows the percentage of formal childcare in all EU Member States (EU-SILC 2016 data).
\textsuperscript{2} The Barcelona targets focus solely on the issue of access. However, it has to be noted that there is a difference between having access to childcare and taking up the offer. Despite the availability of childcare provision, some families may decide not to enrol children. As such, the EU statistics are in fact not about access but about childcare enrolment.
The EC Recommendation ‘Investing in children: breaking the cycle of disadvantage’ created a more targeted framework, with the second pillar of the Recommendation focusing on supporting parents with affordable quality services. Adopted in May 2018 by the European Commission, a Council Recommendation on a quality framework for ECEC is also a step in the direction of improved ECEC services. The planned Recommendation would offer action statements and good practices on providing quality ECEC, and also call for a European benchmark of ECEC places for at least 95% of children between 3 years of age and the mandatory school starting age. A Roadmap towards the Recommendation has been shared with stakeholders for feedback.
The OECD is also in the process of developing the OECD ‘Starting Strong Teaching and Learning International Survey’, a survey of childcare provision that will support a comparison of the structural and process quality features of ECEC services in nine countries, including professional development practices available to staff. Data are being collected this year and the first results will be available in 2020.
---
3 The nine countries participating in the OECD survey are: Chile, Denmark, Germany, Iceland, Israel, Japan, Korea, Norway, and Turkey.
EPIC country profiles highlight developments in ECEC provision across Europe
There have been several initiatives related to ECEC provision across EU member states. First, several countries have increased the available budget to create more childcare places. For example, in 2017 Germany increased its budget by €1.126 billion, aiming to have 100,000 more childcare places available by 2020. The overall objective of this investment programme is to reduce inequalities among children at an early age and allow single mothers to return to work.\textsuperscript{xxxv} Similarly, the government in the Netherlands has invested substantially in improving the quality of childcare to stimulate the use of child care facilities by children from vulnerable groups, such as migrants. The newly elected Dutch government announced in 2017 that it will invest €170 million to strengthen early childhood education and provide 16 hours of teaching per week for disadvantaged pupils.\textsuperscript{xxxvi} Extra public funding was also allocated in the Czech Republic in 2017 with the aim of creating children’s groups and micro-nurseries.
Another policy measure focusing on providing guaranteed childcare places has also been implemented across several member states, such as Hungary, the Czech Republic, Portugal and the UK. For example, Hungary introduced compulsory kindergarten for children aged 3 and above in 2015.\textsuperscript{xxxvii} The overall objective of this measure was to reduce inequalities and improve equal opportunities among children. The change was made to promote formal childcare arrangements for vulnerable children and stimulate their social development. Similarly, in Portugal, preschool is free for children aged 3–6 for up to 25 hours per week. Fees for attendance above this threshold are directly proportional to parental income and are heavily subsidised. Due to the increased investment in preschool education, access to childcare has also increased for children under 3 years of age.\textsuperscript{xxxviii} Free childcare is also available to parents in England and Wales. In September 2017, as part of a wider package of childcare support, the working parents of children aged 3 and 4 were offered an additional 15 hours of childcare. In total, it provided families with parents in employment an entitlement to 30 hours of free childcare, saving families around £5,000 (around €5,700) per year in total. Free childcare (up to 15 hours per week) is also available for 2-year-olds who live in disadvantaged households.\textsuperscript{xxxix} Finally, since 2018 the Czech Republic has provided guaranteed childcare places to all children aged 3 and above, which will be extended to children aged 2 by 2020.
Several Member States have implemented initiatives to promote greater inclusion of children requiring additional support. For example, Denmark made additional investments in the education system in 2017. The Danish ECEC sector focuses on the quality of learning and care facilities with extra attention paid to children from disadvantaged backgrounds.\textsuperscript{xl} The linguistic evaluation of all children at the age of 3 has been expanded to include the language assessment of 2-year-olds. When their linguistic capacity is considered insufficient, the municipalities are obliged to provide the necessary language stimulation activities. Similarly, in Bulgaria, new legislation from 2016 promotes an integrated approach in childcare services and aims to promote the social inclusion of children with special needs.\textsuperscript{xli} The improved regulatory framework emphasises a cross-sectoral approach among education, social and health systems.
Finally, some countries, such as the Czech Republic and Portugal, introduced recommendations guiding the quality of childcare provision. In September 2017 the Czech government approved a new Family Policy Strategy which includes a number of concrete measures for childcare.\textsuperscript{xlii} The suggestions were made in the areas of: free pre-primary education, implementation of quality standards, and unification and simplification of hygiene requirements; these were designed to prevent barriers to the establishment of new childcare services. Similarly, in 2016, new curriculum guidelines for preschool education (OCEPE) were adopted in Portugal to set guidelines for nurseries and childcare centres.\textsuperscript{xliii}
In sum
Overall, various Member States have taken measures to increase the availability and use of childcare provision. Most of these initiatives are based on the principle of inclusiveness and involve integrated approaches focusing on reducing vulnerabilities and inequalities from an early age. Many EU countries have extended ECEC provisions, for example, by offering more free childcare places or number of hours per day or week. In addition, some MS have introduced a guaranteed provision to ensure that all children from a certain age are entitled to access ECEC services.
However, there are still discrepancies in the level, affordability and quality of ECEC provision across Europe.\textsuperscript{xi} This calls for more action to allow all children and families to benefit from high-quality ECEC services. The increased effort in the improvement of ECEC provision and quality can also contribute to other EU priority areas and policies, such as work-life balance and increased participation by women in the labour market.
Chapter 4: Developments in EU Member States in the area of migrant and refugee children policies
Migrant, refugee and asylum-seeking children are often identified as vulnerable groups in the academic and policy literature, at risk of social exclusion and in need of support and protection. As a result of the recent migration crisis and the arrival of unprecedented numbers of migrant children into Europe, many MS were faced with the need to design and implement policy frameworks and practices responding to the multiple and complex needs of these children.
One of the most important causes of exclusion relates to the linguistics capabilities of migrant children. In 2017, Eurydice, a network monitoring the organisation of education systems across Europe, released a report showing that almost all MS provide some formal teaching and learning assistance to migrant and refugee children, for instance in the form of additional group or individual language classes in or outside the school timetable. However, the systematic evaluation of the language capability of newly arrived migrant and refugee children varies among MS, because the different educational systems implement their own processes regarding the reception and inclusion of these children.
Figure 3: Migrant and refugee children in the EU Member States in 2017
Source: Eurostat (2018)
Member State support to migrant, refugee and asylum-seeking children
There have been a number of recent initiatives across EU MS to support migrant, refugee and asylum-seeking children. EPIC country profiles provide concrete examples of such activities, programmes, policies and legislative frameworks aimed at integrating these vulnerable groups of children.
First of all, several countries, such as Greece, Italy, the Netherlands and Germany, have introduced initiatives related to facilitating access to education. Greece is one of the countries most affected by the migrant and refugees crisis. As part of the measures taken in response, at the beginning of 2016 the Ministry of Education, Research and Religious Affairs established the ‘Refugee Education Programme’. The aim of this programme is to provide reception facilities for refugee children in public schools across the country, and to provide afternoon courses. The ultimate objective of this policy framework is the integration of all refugee children into schools in the morning timetable for the academic year 2017-2018. In Italy, migrant children’s right to access education has been codified into legal act. Based on article 12 of the United Nations Conventions of the Rights of the Child (CRC), the Italian government introduced Law no. 47/2017 which focuses on the support and protection of unaccompanied refugee children and their entitlement to access education and participate in the decision-making process regarding their education. Similarly, the Dutch Ministry of Education launched the Equal Opportunities Alliance Framework in 2016 outlining the need for provision of equal opportunities for migrant children in education. In Germany, the programme ‘Culture empowers – Alliances for education’ also focuses on the provision of education opportunities. The programme will continue from 2018 to 2022 with new financial resources of €250 million.
The provision of adequate housing standards for migrant and refugee children and their families has been also one of the priority areas for some EU MS. The provision of accommodation for refugee children and families, especially unaccompanied migrant minors with uncertain residency status, is one of the key focus areas in Germany. The biggest achievement of the ‘National initiative for the protection of refugees and migrants living in refugee centres in Germany’, launched in 2016, has been the establishment and implementation of the Minimum Standards for the protection of refugees and migrants living in refugee shelters, which were developed in collaboration with over 30 partners. In addition, Germany has also introduced other programmes, such as:
- ‘Improving the accommodation, supply and care of foreign children and adolescents’ (2015);
- ‘Look forward! What your child does with Media’, a national initiative for the protection of refugees and migrants living in refugee centres in Germany; and
- ‘Accompanied and unaccompanied migrant minors – living conditions and integration processes from the perspective of young refugees’, taking place in 2017 and 2018.
This last programme focuses on the identification of changes, challenges and developments in refugees’ lives based on their personal views and lived experiences in the host community.
An integrated approach towards the needs of migrant and refugee children was implemented in Bulgaria in 2016. Due to the rapidly increasing numbers of unaccompanied minors and victims of trafficking among asylum seekers, the Bulgarian state identified the imperative need to design and implement coordinated healthcare and educational interventions focusing on the provision of humanitarian protection and rehabilitation. The objective of two projects, ‘Support for Preschool Education of Disadvantaged Children’ and ‘Educational Integration of Students from Ethnic Minorities and/or Asylum or International Protection’, is the integration and access to education for children of ethnic minorities. Finally, there have been specific healthcare policy actions. The policy framework stipulates that asylum-seeking families with children, and families in which one or both parents have separated, are eligible for a Child Allowance providing access to medical and dental health.”
Apart from third-country migrants and refugee children, MS have also put in place provisions and programmes for intra-EU migrant children and other disadvantaged children, for example Roma. For example, the Estonian Lifelong Learning Strategy for 2014–2021 sets the policy strategy towards the inclusion of
national minorities in the educational system. More specifically, the policy supports the creation of an inclusive national curriculum and the development of teacher education and educational counselling concerning national minorities.\textsuperscript{13} Since 2013 the Portuguese local authorities, in collaboration with universities and local NGO’s, have implemented several programmes in 21 inter-municipal communities focusing on the promotion of equality and social justice. The ultimate goal of these programmes is the prevention of early school drop-outs, especially among populations facing social exclusion, such as the Roma community.\textsuperscript{14} The Romanian National Strategy for 2014-2020 also focuses on the imperative for the provision of community-based healthcare programmes to Roma communities.\textsuperscript{15} In addition, there is special support available to children of parents who reside outside Romania. According to Decision no. 691/2015, children of parents who have migrated to work in other countries are entitled to a school counsellor providing support regarding the children’s academic achievements and any mental health needs they have. Additionally, in cases where both parents have migrated to work abroad, children are eligible for social assistance services visits every two months for the first six months, and then systematically each trimester, assessing school performance, social adaptation and mental health.\textsuperscript{16}
\textbf{In sum}
EU countries are putting in place legal and policy frameworks, and concrete actions and programmes, to promote the social inclusion of migrant, refugee and asylum-seeking children and their families. These initiatives often aim to take an inclusive and coordinated approach encompassing education, healthcare, social care and housing services. It is worth noting that some of these initiatives apply holistic approaches that focus not only on academic and learning development, but also respond to children’s social, emotional and mental health needs.\textsuperscript{17}
CHAPTER 5: CHANGES IN PARENTAL AND PATERNITY LEAVE POLICIES AND PROVISIONS
Studies suggest that paternity and parental leave policies can have a positive impact on child development, the reconciliation of work and family life and the reduction of gender inequality in the labour market.\textsuperscript{[vi]}
Paternity leave tends to involve a short-term interval from work for employed fathers after the birth of a child. Parental leave is an individual or a family right and it is defined as a period of leave for employed parents which is additional to paternity and maternity leave.\textsuperscript{[vii]} All European countries provide some type of parental or paternity leave scheme. However, the type, duration and compensation of parental and paternity leave provisions vary between European countries.
Despite some legislative and policy actions at the EU level and the efforts of the MS to promote parental and paternity leave, there are still some significant barriers to the uptake of parental and paternity leave by fathers across European countries. These obstacles relate to perceptions of the social and cultural norms about gender roles in supporting a child’s development, and the lack of employment support and flexibility for fathers wishing to receive leave.\textsuperscript{[viii]}
**New developments: ‘Directive on Work-Life Balance for Parents and Carers’**
In April 2017, the European Commission outlined the European Pillar of Social Rights.\textsuperscript{[ix]} As part of this initiative, the ‘Directive on Work-Life Balance for Parents and Carers’\textsuperscript{[x]} was proposed, setting out a list of policy measures which aim to support working parents and carers in achieving a balance between their work and family life. These measures aim to ensure that all families have access to affordable childcare services and entitlement to adequate parental leave arrangements, e.g. by reserving part of the leave entitlement to fathers so it cannot be transferred to mothers. The ultimate objective of the directive is the prevention of discrimination against parents and carers in the workplace, and the enhancement of women’s participation in the labour market. After a review by the European Parliament’s Committee on Employment and Social Affairs in February 2018,\textsuperscript{[xi]} a set of amendments was proposed to further facilitate combining work with family-related responsibilities.\textsuperscript{[xii]}
Figure 4: Paternity leave offered in nearly all EU28 Member States
Source: Based on Blum et al. (2017) and European Platform for Investing in Children, (2018)
Figure 5: Just over a third of EU28 Member States reserve a proportion of parental leave to fathers. In addition, parental leave is often not well paid
Source: Based on Blum et al. (2017) and European Platform for Investing in Children (2018)
There have been several developments in parental and paternity leave provision across Member States.
First, several MS, such as Cyprus, the Czech Republic, Portugal, Slovenia and Spain have introduced new leave entitlements for fathers. For example, in line with the Act 120/2015 implemented from 1 September 2015, both parents in Portugal have the right to receive parental leave of 120 or 150 consecutive days. Additionally, employed fathers have to take mandatory paternity leave of 15 working days. Similar legislative changes have been introduced in Spain. According to new laws introduced in 2017, employed fathers are entitled to four weeks of paternity leave during or after maternity leave on a full- or part-time basis. Between 2016 and 2017 a 0.4% increase in the use of parental leave by fathers was observed in Spain. And recent data provided by the Spanish Ministry of Employment and Social Security highlighted that the number of fathers receiving paternity leave (196,873) almost reached the numbers of mothers taking maternity leave (200,618). The plan to extend paternity leave from two to four weeks was approved in 2009 and was intended to be implemented in 2011, but eventually it was put into effect on 1 January 2017. A further extension in the length of paternity leave up to five weeks is planned to be implemented in 2018. More recently, since the summer of 2017, fathers in Cyprus have been eligible for two weeks’ paternity leave and social security benefits paid at 72% of their mean salary. Similarly, according to recent policy changes, from 2018, fathers in Slovenia are entitled to 30 days of paid paternity leave, and each parent to 130 days of parental leave. Finally, since February 2018, in line with the new paternity leave policy, fathers have an entitlement of seven days’ leave within six weeks of the birth, adoption or fostering of a child, and to claim up to 70% of their salary. The leave can be taken at any time within the six weeks and aims to enhance fathers’ engagement in supporting the development of young children.
An extension of leave entitlements for parents was also one of the policy measures introduced in MS. For example, according to Law 232/2016, the duration of parental leave for employed fathers in Italy has been extended to two weeks, aiming to promote work-family balance for both parents. Mothers and fathers are each eligible for parental leave up to six months, with a maximum of 11 months per child. In Slovakia, the right to receive maternity leave benefits was extended to fathers. As a result, the number of fathers receiving maternity leave benefits has increased from 837 in 2016 to 1,767 in 2017. This represents 7% of all recipients. The state of Luxembourg implemented a new law regarding flexible parental leave, aimed at the reconciliation of work and family life. According to the new law, introduced in December 2016, parents are entitled to receive parental leave until the child turns 6 years of age. Additionally, parents have the right to take parental leave during the same period. Another reform, introduced on 1 January 2018, extended paternity leave from two to ten working days.
Some measures promoting sharing of leave entitlements were also introduced across Europe. In 2017, the Estonian government introduced the Family Benefits Act covering aspects related to parental leave. These changes, planned to be implemented gradually from 2018 to 2020, aim to encourage more fathers to take up leave entitlements and improve the work and family life balance. More specifically, parents will have 515 days of leave per child to be used over a period of 3 years. Additionally, from July 2020, fathers will receive an additional 30 days of parental benefits. The Family Benefits Act allows parents to work during parental leave without losing the parental leave benefit. Some policy modifications have also been introduced in France regarding parental leave for children born since 2015. These amendments aim to achieve equal sharing of parental responsibilities and reduce the gender pay gap. Finally, in March 2017, policy reforms in Austria introduced the option of a so-called ‘partner bonus’ of €500 for each parent, in case both parents equally share the leave provision and allowance. Furthermore, another new measure entitled ‘family time bonus’ gives additional financial support to working fathers who intensively and exclusively take care of their families and interrupt their job, directly after the birth of their child, for at least
28 days. Such fathers are entitled to a bonus of €22.60 daily (approx. €700 per month).
Finally, **specific measures focused on the provision of financial support** were introduced in some MS. For instance, the policy reforms introduced in Latvia in 2014 aimed to enhance financial support with childcare for children aged up to 18 months. Parents are entitled to choose either to receive leave until the child is 12 months old or to take leave up until the child is 18 months old. Parents have the right to receive parental benefits and work at the same time. The financial support measures were also strengthened in Sweden. In January 2016, the Swedish State extended the basic level of paid leave to 250 SEK (€25) per day. Additionally, the number of non-transferrable months between parents was increased in 2016 from two to three. Despite the fact that mothers are still the primary users of parental leave (in 2017, 72.4% of all days were taken by mothers and 27.6% by fathers), there was an increase of 2.7% in the proportion of parental leave days taken by fathers in 2016 and 2017. Overall, the number of parental leave days taken by Swedish fathers is still considerably more than that by fathers in other EU Member States.
**In sum**
Overall, recent changes in parental and paternity leave provisions introduced across European MS have a common aim of greater gender equality and equal sharing of work and family responsibilities between parents. The most recent changes have focused on greater flexibility in the use of leave provision, the extension of the duration of leave, provision of greater financial support during leave, and more encouragement to fathers to take up allocated leave entitlements. However, despite progress made in recent years, there are still opportunities across Europe to design and implement further policies that promote the well-being of both parents and support them in achieving greater reconciliation between work and family life.
CHAPTER 6: CHANGES IN MATERNITY LEAVE POLICIES AND PROVISIONS IN EUROPE
Maternity leave is an important health measure allowing women to recover from pregnancy and childbirth, as well as to bond with a newborn baby. However, some research studies indicate that long periods of leave can have negative effects on women’s labour market attachment and career advancement. In order to reflect calls for greater gender equality and a more equal share of childcare responsibilities, over recent years many EU countries have made changes to the design of their maternity leave provisions.\textsuperscript{100-102}
According to the EU Maternity Leave Directive (92/85/EEC)\textsuperscript{103}, mothers are entitled to receive at least 14 weeks of maternity leave from which two are mandatory, to be taken prior to or after childbirth. This directive provides MS only with general guidelines on maternity leave policies. In practice, most of the maternity leave policies in European MS are targeted at women after childbirth and concern the first period of motherhood, accompanied by a type of public income support. However, there are significant differences in the implementation of maternity leave policies across European MS with regards to whether maternity leave is compulsory or not, the eligibility criteria, the duration, the type, and the amount of financial benefit.
A number of MS have made changes regarding maternity leave policies as a result of the revised Parental Leave Directive (Council Directive 2010/18/EU).\textsuperscript{104} This Directive gives male and female workers an individual right to parental leave on the grounds of the birth or adoption of a child. In addition, mothers were granted the right to transfer part of their leave allocation period to the other parent. The policy modifications aim at the promotion of gender equality through shared parenthood responsibilities.
**Figure 6 Number of post-natal maternity leave weeks in EU28 countries**
Source: European Parliament (2014)\textsuperscript{105}
In response to the changes to the Parental Leave Directive and wider societal changes, EU MS made amendments to their maternity leave provisions. These initiatives were predominantly aimed at protecting women’s rights concerning motherhood as well as promoting gender equality and female participation in the labour market.\textsuperscript{106} Nevertheless, despite similar aims, significant variations in maternity leave policies exist across European countries.
Recent developments on maternity leave policies across Member States
Similarly to policy changes related to parental and paternity leave provisions, recent initiatives and actions regarding maternity leave were also focused on offering greater flexibility in leave use, offering more financial security to mothers on maternity leave, and the promotion of sharing of leave between parents by converting parts of maternity leave into parental leave.
The opportunities for greater flexibility in leave use were created in Croatia and the Czech Republic. According to the Croatian legislative framework, maternity leave lasts until the child is 6 months old, and it can be transferred to the father following the obligatory period of 28 days before and 70 days after the birth. Additionally, maternity leave and payment can be transferred to fathers. In 2015, 0.3% of fathers exercised their right to transfer leave.\textsuperscript{Xciii} Similarly, maternity leave entitlements can be transferred from a child’s mother to a father in the Czech Republic. According to Czech legislation, maternity leave equates to 28 weeks which include 6–8 weeks during pregnancy and 20–22 weeks after the birth of a child. The provision can be shared with the other parent after the completion of the sixth week.\textsuperscript{Xciv}
The flexibility of maternity leave provisions can also relate to more flexibility in combining leave and paid employment. For example, the family policy reforms introduced in Hungary in 2014 aimed to promote the employment of mothers with children under 3 years of age by offering part-time employment and other financial bonuses to start working prior to the child’s second birthday.\textsuperscript{Xcv} The focus of these policy changes from providing the right for mothers to stay home for several years on paid maternal leave looking after the child, to encouraging mothers to return to the labour market after a relatively short period of parental leave, and allowing the father to stay home. In addition, both parents are entitled to financial support for the provision of childcare services at home until the child reaches the age of 3.\textsuperscript{Xcvii}
Finally, policy measures that aimed at the provision of greater financial security during maternity leave were introduced across a number of MS. For example, between 2013 and 2015, the Government of Malta introduced measures which aim to achieve greater balance between family and professional life through an increase in the maternity leave benefit, which includes self-employed women and adoptive parents.\textsuperscript{Xcviii} Additionally, there were measures implemented giving a special maternity benefit to women working in the private sector.\textsuperscript{Xcix} In addition, the minimum level of maternity leave benefit was increased in the Czech Republic and Slovakia. Since 2016, maternity benefit in the Czech Republic has been related to income, and for women earning up to 901 CZK (€35) per day, the allowance amounts to 70% of their income. The maximum amount of maternity benefit in 2017 was 33,120 CZK (€1,295) per month or 1,104 CZK (€43) per day.\textsuperscript{Xcxi} From 1 May 2016, the benefit provided to mothers during maternity leave in Slovakia has been increased to 75% (from a prior level of 65%) of the base salary (with a monthly ceiling of one and a half times the national average monthly wage).\textsuperscript{xci} Finally, in Spain, mothers who are eligible to receive maternity benefit can enjoy 100% of their earnings during maternity leave, which in 2017 was up to a maximum of €3,751.20.\textsuperscript{xcii} Additionally, mothers who do not meet the eligibility criteria for maternity benefits, in 2017 received a flat-rate benefit of €537.84 per month or €17.93 per day, for 42 calendar days. In addition, the non-contributory benefit is extended to a total of 56 calendar days for lone mothers, large families, multiple births and disabled children.\textsuperscript{xciii}
In sum
Current maternity leave provisions are guided by the EU Maternity Leave Directive. However, over the years a number of countries have extended the minimum standards required by the Directive, such as extending the length of leave provision or level of leave benefit payments. Some of these changes resulted from the more recent revised
Parental Leave Directive. Overall, the aim of the changes is to achieve greater gender equality and facilitate career progression of both mothers and fathers.\textsuperscript{61} This is achieved by formally allowing fathers to take time off to look after children, by transferring some of the maternity leave provisions to fathers, by sharing parental leave provisions with mothers, or by allocating a dedicated leave provision to fathers. Despite progress, there is still a need for more action to fully allow mothers and fathers to enjoy and combine their professional and family roles.
CHAPTER 7: DEINSTITUTIONALISATION OF CHILD CARE SERVICES IN EUROPE
Growing up in institutional care has a harmful effect on children’s physical, cognitive and emotional development. Children brought up in institutions often have reduced intellectual and social skills, suffer from low confidence and have difficulty building relationships with others.\textsuperscript{civ}
The process of deinstitutionalisation of the child care system aims to eradicate social exclusion and refers to a transition from the provision of institutional to community-based services focusing on the integration of children and families into the wider community.\textsuperscript{cv} The \textit{United Convention on the Rights of the Child (1989)}\textsuperscript{cv} established a global right to quality education for all children by highlighting that they should receive and enjoy a standard of living which facilitated the development of their physical, mental, social and emotional health, in a family environment of happiness, love and understanding. Institutional care services are often not able to provide this supportive family environment. As such, the efforts towards deinstitutionalisation involve a shift towards community-based services, including foster care services, aiming to support families towards the engagement of children, parents and carers, and improvement of the quality of life through extended support opportunities. One of the major challenges in the near future is to ensure that the successful and radical shift from institutional care to family-based services encompasses all children. This requires an interdisciplinary approach, involving areas of social care, health and education, focusing on the holistic development of the child.\textsuperscript{cvi}
\textbf{Policy documents guide the transition from institutional to community-based care}
In 2012, the \textit{European Expert Group on the Transition from Institutional to Community-based care}\textsuperscript{cvii} designed and developed \textit{Common European Guidelines}\textsuperscript{cvx} to assist MS in the transition to community-based services. Additionally, in 2014, the European Expert Group developed a \textit{Toolkit on the Use of European Union Funds}\textsuperscript{cx} to support all countries for the Transition from Institutional to Community Based Care. According to the \textit{Fundamental Rights Agency (FRA)}\textsuperscript{cxi}, by 2017, 60% of Member States had implemented deinstitutionalisation policy plans.
\textbf{European initiatives towards deinstitutionalisation}
Since the beginning of 2013, Eurochild, an advocacy group for children’s rights, has organised the campaign \textit{Opening Doors for Europe’s Children},\textsuperscript{cxii} focusing on support for national initiatives to develop child protection networks. The aim of the campaign has been to reinforce families’ engagement in the efforts towards the provision of alternative care for children and the improvement of the quality of life. The first stage of the campaign, which took place from 2013 to 2015 in 12 European countries, aimed at raising awareness about deinstitutionalisation by developing policies and action plans supporting this transition. The ongoing second phase, running from 2016 to 2018, involves a wider range of new and existing national and international partner organisations, and has also expanded geographically into four new countries in Western Europe.
\textbf{There are many initiatives supporting deinstitutionalisation across the EU}
Across Europe some countries have introduced \textit{new legislative frameworks and policies to provide support measures towards deinstitutionalisation of childcare services}. Lithuania has developed a programme conforming to the Child Welfare Action Plan for 2016-2018 promoting the provision of community-based social, educational and health care, and preventive and inclusive care services to children who have lost parental care.\textsuperscript{cxiii} The programme aims to facilitate the development of children in a healthy family environment offering proper care, support or adoption in order to respond to their
needs.\textsuperscript{cxiv} Similarly, Bulgaria implemented the programme ‘Vision for Deinstitutionalisation of Children in the Republic of Bulgaria’ in 2016 focusing on the development of support services to prevent separation of children from their families. In 2016, the programme facilitated 4,838 participants, including 2,826 children and young people, involving 147 providers of social care services. The services of the programme included foster care and special foster care to disabled children and unaccompanied refugee minors.\textsuperscript{cxv} In Latvia, the government’s policy plans for the years 2014 to 2020 aim towards the progressive induction of programmes facilitating the transition from institutional to community and family-based care. The policies and action plans implemented by local governments have the initial target of combating child poverty and social exclusion.\textsuperscript{cxvi}
Finally, in 2014 the Ministry of Social Affairs in Estonia produced a ‘Green Paper on Alternative Care’\textsuperscript{cxvii} for the design and restructure of alternative care services, promoting the inclusion of all children and families in community-based settings. The ultimate objective of the programme was to reinforce the improvement of family-based care. In Estonia, deinstitutionalisation modifications focus on creating residential care settings entitled ‘Small Group Homes’.\textsuperscript{cxviii}
\textit{In sum}
MS are making systematic progress towards the development of alternative child care services by introducing new legislative actions, implementing policies and action plans, and initiating practical programmes in order to transform the lives of many children in Europe. There is still need for further action considering not only the implementation, but also the evaluation, of the current modifications aimed at the transition from institutional to community-based child care services. However, the first steps towards the promotion of deinstitutionalisation and the improvement of the quality of life for young children and families have already been initiated.
CONCLUSION
This EPIC annual thematic report provides a snapshot of recent changes in European- and national-level child and family policies. It is based on the information provided in the EPIC national profiles summarising recent developments in the 28 EU member states.\textsuperscript{cxxx}
The major change in child and family policy in the EU in 2017 was the presentation and proclamation of the European Pillar of Social Rights. Together with the 2013 Recommendation ‘Investing in Children’, over the next few years the Pillar will shape the policy landscape for children and families. As such, it will have an impact on the legislative actions, policy frameworks, and other programmes and initiatives at the EU and MS levels. Within this framework, we can expect some further developments relating to the key remaining challenges, such as the distribution and persistence of child poverty, access to affordable childcare provision of a high standard, social inclusion and support for migrant children, equal sharing of work and family responsibilities between parents, and the transition from institutional to community-based child care services.
Looking forward, it is possible that the European Parliament initiative for a ‘Child Guarantee Scheme for Vulnerable Children’ will become an important driver for change in the area of child and family policy in Europe over the next few years. The Child Guarantee, formulated as a new political priority by the European Parliament, and currently in the phase of the preparatory action, will aim to lay down an implementing framework for EU policies, legislation and programmes for the provision of essential services to children. As currently planned, the Child Guarantee will offer an integrated approach to tackling the multidimensional aspects of child poverty, ensuring that all children in Europe have access to free health care, free education, free childcare, decent housing and adequate nutrition.\textsuperscript{cxx}
Overall, the direction of current developments in the area of child and family policy in the EU is based on the principle of inclusiveness and integrated approaches. The Child Guarantee Scheme could provide further movement in this direction, with the aim of overcoming the remaining but persistent challenges relating to child poverty and inequality.
ENDNOTES
i European Commission. 2013. ‘Investing in children: breaking the cycle of disadvantage’, C(2013) 778 final. As of 6 June 2018: http://ec.europa.eu/social/BlobServlet?docId=9762&langId=en
ii European Commission. 2017. ‘European Pillar of Social Rights’. As of 6 June 2018: https://ec.europa.eu/commission/publications/european-pillar-social-rights-booklet_en
iii European Commission. 2018. ‘Country profiles’. As of 6 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en
iv European Parliament. 2016. ‘Report on a European Pillar of Social Rights’, (2016/2095(INI)). As of 5 June 2018: http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A8-2016-0391+0+DOC+XML+V0//EN
v European Commission, n.d. ‘Delivering on the European Pillar of Social Rights’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1226&langId=en
vi European Commission, n.d., ‘European Pillar of Social Rights’, As of 5 June 2018: https://ec.europa.eu/commission/priorities/deeper-and-fairer-economic-and-monetary-union/european-pillar-social-rights_en
vii European Commission, n.d. ‘European Pillar of Social Rights in detail’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1310&langId=en
viii European Commission. 2018. ‘Monitoring the implementation of the European Pillar of Social Rights’. SWD(2018) 67 final. As of 5 June 2018: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018SC0067&from=EN
ix European Commission. n.d. ‘2018 European Semester: Country Specific Recommendations / Commission Recommendations’. As of 6 June 2018 : https://ec.europa.eu/info/publications/2018-european-semester-country-specific-recommendations-commission-recommendations_en
x European Commission. 2018. ‘European Semester Thematic Factsheet: Social Inclusion’. As of 18.05.2018: https://ec.europa.eu/info/sites/info/files/file_import/european-semester_thematic-factsheet_social_inclusion_en_0.pdf
xi At risk of poverty or social exclusion (abbreviated as AROPE) is an indicator referring to the situation of people either (1) at risk of poverty (people with an equivalised disposable income below the at-risk-of-poverty threshold, which is set at 60% of the national medial equivalised disposable income after social transfers), or (2) severely materially deprived (material deprivation rate is an indicator that expresses the inability to afford some items considered by most people to be desirable or even necessary to lead an adequate life), or (3) living in household with a very low work intensity (defined as the number of persons living in a household where the members of working age worked less than 20 % of their total potential during the previous 12 months).
Sources:
- Eurostat. 2014. ‘Glossary: At risk of poverty or social exclusion (AROPE)’. As of 28 May 2018: http://ec.europa.eu/eurostat/statistics-explained/index.php/Glossary:At_risk_of_poverty_or_social_exclusion_(AROPE);
- Eurostat. 2014. ‘Glossary: At-risk-of-poverty rate’. As of 28 May 2018: http://ec.europa.eu/eurostat/statistics-explained/index.php?title=Glossary:At-risk-of-poverty_rate;
- Eurostat. 2016. ‘Glossary: Material deprivation’. As of 28 May 2018: http://ec.europa.eu/eurostat/statistics-explained/index.php?title=Glossary:Severe_material_deprivation_rate;
- Eurostat. 2017. ‘Glossary: Persons living in households with low work intensity’. As of 28 May 2018: http://ec.europa.eu/eurostat/statistics-explained/index.php?title=Glossary:Persons_living_in_households_with_low_work_intensity.
xii Eurostat. 2017. ‘EU children at risk of poverty or social exclusion’. As of 3 March 2018: http://ec.europa.eu/eurostat/web/products-eurostat-news/-/EDN-20171120-17?inheritRedirect=true
xiii European Commission. 2018. ‘Country profiles - Ireland: Policies and progress towards investing in children’. As of 2 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3645
xiv European Commission. 2018. ‘Country profiles – Denmark: Policies and progress towards investing in children’. As of 2 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3638
xv European Commission. 2014. National social report – Denmark. As of 2 June 2018: http://ec.europa.eu/social/BlobServlet?docId=11678&langId=en
xvi European Commission. 2018. ‘Country profiles - Poland: Policies and progress towards investing in children’. As of 2 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3652
xvii European Commission. 2018. ‘Country profiles - Italy: Policies and progress towards investing in children’. As of 2 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3646
xviii European Commission. 2018. ‘Country profiles - Latvia: Policies and progress towards investing in children’. As of 2 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3647
xix European Commission. 2018. ‘Country profiles - Greece: Policies and progress towards investing in children’. As of 2 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3643
xx Ibid.
xxi Janta, B., Van Bell, J., Stewart, K. 2016. Quality and impact of Centre-based Early Childhood Education and Care. EPIC Policy Brief. As of 29.05.2018: https://www.rand.org/content/dam/rand/pubs/research_reports/RR1600/RR1670/RAND_RR1670.pdf
xxii Ibid.
xxiii European Commission. 2018. ‘Barcelona objectives’. As of 3 June 2018: https://ec.europa.eu/info/sites/info/files/bcn_objectives-report2018_web_en.pdf
xxiv Ibid.
xxv Ibid.
xxvi European Commission. 2017. ‘Taking stock of the 2013 Recommendation on ‘Investing in children: breaking the cycle of disadvantage’. As of 3 June 2018: http://ec.europa.eu/social/BlobServlet?docId=17618&langId=en
xxvii European Commission. 2018. ‘Early childhood education and care’. As of 4 June 2018: http://ec.europa.eu/education/policy/school/early-childhood_en
xxviii Ibid.
xxix European Commission. 2018. ‘Published initiatives’, 2018-1505951. As of 4 June 2018: https://ec.europa.eu/info/law/better-regulation/initiatives.
xxx OECD. 2018. ‘OECD Starting Strong Teaching and Learning International Survey’. As of 5 June 2018: http://www.oecd.org/education/school/oecd-starting-strong-teaching-and-learning-international-survey.htm
xxxi European Commission. 2018. ‘Country profiles - Germany: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3642
xxxii European Commission. 2018. ‘Country profiles - Netherlands: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3651
xxxiii European Commission. 2018. ‘Country profiles - Hungary: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3644
xxxiv European Commission. 2018. ‘Country profiles - Portugal: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3653
xxxv European Commission. 2018. ‘Country profiles - United Kingdom: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3659
xxxvi European Commission. 2018. ‘Country profiles - Denmark: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3638
xxxvii European Commission. 2018. ‘Country profiles - Bulgaria: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3634
xxxviii European Commission. 2018. ‘Country profiles - Czech Republic: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3637
xxxix European Commission. 2018. ‘Country profiles - Portugal: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3653
xl See for example Eurostat data on formal childcare by age group and duration [Eurostat variable name: ilc_caindformal]
xli European Commission. 2017. ‘Eurydice releases new data on language provision for migrant schoolchildren across Europe’. As of 6 June 2018: http://ec.europa.eu/social/main.jsp?langId=en&catId=1248&newsId=9012&furtherNews=yes
xlii Eurostat. 2018. ‘Asylum Statistics.’ As of 28 June 2018: http://ec.europa.eu/eurostat/statistics-explained/index.php/Asylum_statistics
xliii European Commission. 2018. ‘Tackling child poverty and social exclusion in the EU – How EU funding mechanisms can help’. As of 6 June 2018: http://ec.europa.eu/social/main.jsp?catId=738&langId=en&pubId=8087&furtherPubs=yes
xliv European Commission. 2018. ‘Country profiles - Greece: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3643
European Commission. 2018. ‘Country profiles – Italy: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3646
European Commission. 2018. ‘Country profiles – Netherlands: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3651
European Commission. 2018. ‘Country profiles - Germany: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3642
Ibid.
Ibid.
European Commission. 2018. ‘Country profiles – Bulgaria: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3634
European Commission. 2018. ‘Country profiles - Sweden: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3658
European Commission. 2018. ‘Country profiles - Estonia: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3639
European Commission. 2018. ‘Country profiles - Portugal: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3653
European Commission. 2018. ‘Country profiles - Romania: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3654
Ibid.
European Commission. 2018. ‘Tackling child poverty and social exclusion in the EU - How EU funding mechanisms can help’. As of 6 June 2018:
http://ec.europa.eu/social/main.jsp?catId=738&langId=en&pubId=8087&furtherPubs=yes
Janta, B., Van Bell, J., Stewart, K. 2016. *Quality and impact of Centre-based Early Childhood Education and Care*. EPIC Policy Brief. As of 29.05.2018:
https://www.rand.org/content/dam/rand/pubs/research_reports/RR1600/RR1670/RAND_RR1670.pdf
Ibid.
Janta, B. and Stewart, K. 2018. *Paternity and parental leave policies across the EU - Assessment of current provision*. As of 27.07.2018:
http://ec.europa.eu/social/main.jsp?catId=738&langId=en&pubId=8120&furtherPubs=yes
European Union. 2017. ‘European Pillar of Social Rights’. As of 1 June 2018::
https://ec.europa.eu/commission/sites/beta-political/files/social-summit-european-pillar-social-rights-booklet_en.pdf
European Commission, n.d. ‘Work-life balance’. As of 1 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1311&langId=en
European Parliament. 2018. ‘Hearings: Hearing on Work-Life Balance’. As of 1 June 2018: http://www.europarl.europa.eu/committees/en/empl/events-hearings.html?id=20180213CHE03401
European Parliament. 2018. ‘Draft report on the proposal for a directive of the European Parliament and of the Council on work-life balance for parents and carers and repealing Council Directive 2010/18/EU’, 2017/0085(COD). As of 1 June 2018: http://www.europarl.europa.eu/sides/getDoc.do?type=COMPARL&reference=PE-618.193&format=PDF&language=EN&secondRef=01
Blum, S., Koslowski, A. & Moss, P. (eds.), 13th International Review of Leave Policies and Related Research, International Network on Leave Policies and Research, 2017. As of 16 April 2018: http://www.leavenetwork.org/fileadmin/Leavenetwork/Annual_reviews/2017_Leave_Review_2017_final.pdf
European Commission, n.d. ‘Country profiles’. As of 16 April 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en
Blum, S., Koslowski, A. & Moss, P. (eds.), 13th International Review of Leave Policies and Related Research, International Network on Leave Policies and Research, 2017. As of 16 April 2018: http://www.leavenetwork.org/fileadmin/Leavenetwork/Annual_reviews/2017_Leave_Review_2017_final.pdf
European Commission, n.d. ‘Country profiles’. As of 16 April 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en
European Commission. 2018. ‘Country Profiles’. As of 27 May 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en
Portugal: Act number 120/2015. As of 27 May 2018: https://dre.pt/application/conteudo/70152047
European Commission. 2018. ‘Country profiles - Portugal: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3653
European Commission. 2018. ‘Country profiles - Spain: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3657
Ministry of Labour, Migration and Social Security. 2017. ‘The benefits in maternity and paternity increased to 1,393.5 million euros between January and September 2017’. As of 5 June 2018: http://prensa.empleo.gob.es/WebPrensa/noticias/seguridadsocial/detalle/3159
European Commission. 2018. ‘Country profiles - Cyprus: Policies and progress towards investing in children’. As of 5 June 2018 http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3636
European Commission. 2018. ‘Country profiles - Slovenia: Policies and progress towards investing in children’. As of 5 June 2018 http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3656
European Commission. 2018. ‘Country profiles - Czech Republic: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3637
Italy: ‘Legge di bilancio 2017’, 232/2016. As of 28 May 2018: http://www.camera.it/temi/ap/2016/12/23/OCD177-2628.pdf
European Commission. 2018. ‘Country profiles – Italy: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3646
European Commission. 2018. ‘Country profiles – Slovakia: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3655
European Commission. 2018. ‘Country profiles – Luxembourg: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3649
Riigikogu. 2016. ‘Estonian Family Benefit Act’. As of 28 May 2018:
https://www.riigiteataja.ee/en/eli/ee/518122017014/consolide
European Commission. 2018. ‘Country profiles – Estonia: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3639
European Commission. 2018. ‘Country profiles – France: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3641
European Commission. 2018. ‘Country profiles – Austria: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3632
European Commission. 2018. ‘Country profiles – Latvia: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3647
European Commission. 2018. ‘Country profiles – Sweden: Policies and progress towards investing in children’. As of 5 June 2018:
http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3658
Ibid.
Janta, B., Van Bell, J., Stewart, K. 2016., Quality and impact of Centre-based Early Childhood Education and Care. EPIC policy brief. As of 29.05.2018:
https://www.rand.org/content/dam/rand/pubs/research_reports/RR1600/RR1670/RAND_RR1670.pdf
Strang, L. and Broeks, M. 2016., Maternity Leave Policies, Trade-offs Between Labour Market Demands and Health Benefits for Children. EPIC policy brief. As of 30.05.2018:
https://www.rand.org/pubs/research_reports/RR1734.html
European Commission. 2008. ‘Directive amending Council Directive 92/85/EEC on the introduction of measures to encourage improvements in the safety and health at work of pregnant workers and workers who have recently given birth or are breastfeeding’, 92/85/EEC. As of 29 May 2018:
https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52008PC0637&from=EN
Council of the European Union. 2010. ‘Directive implementing the revised Framework Agreement on parental leave concluded by BUSINESSEUROPE, UEAPME, CEFP and ETUC and repealing Directive 96/34/EC, L 68/13. As of 30 May 2018 : http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32010L0018
European Parliament. 2014. ‘Maternity and paternity leave in the EU: At a glance.’ As of 7 September 2016:
Strang, L., Broeks, M. 2016. *Maternity Leave Policies. Trade-offs Between Labour Market Demands and Health Benefits for Children*. EPIC policy brief. As of 30.05.2018: https://www.rand.org/pubs/research_reports/RR1734.html
European Commission. 2018. ‘Country profiles - Croatia: Policies and progress towards investing in children’. As of 3 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3635
European Commission. 2018. ‘Country profiles - Czech Republic: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3637
European Commission. 2018. ‘Country profiles - Hungary: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3644
European Commission. 2018. ‘Country profiles - Hungary: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3644
Department of Social security, n.d. ‘The History of Social Security in Malta’. As of 2 June 2018: https://socialsecurity.gov.mt/en/about-us/Pages/The-History-of-Social-Security-in-Malta.aspx
European Commission. 2018. ‘Country profiles - Malta: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3650
European Commission. 2018. ‘Country profiles - Czech Republic: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3637
European Commission. 2018. ‘Country profiles - Slovakia: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3655
European Commission. 2018. ‘Country profiles - Spain: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3657
European Commission. 2018. ‘Country profiles - Spain: Policies and progress towards investing in children’. As of 5 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3657
Strang, L., Broeks, M. (2016). *Maternity Leave Policies. Trade-offs Between Labour Market Demands and Health Benefits for Children*. EPIC Policy Brief. As of 30.05.2018: https://www.rand.org/pubs/research_reports/RR1734.html
Opening Doors , n.d. ‘Institutional care in Europe’. As of 27 May 2018: http://www.openingdoors.eu/institutional-care-in-europe/
European Commission. 2018. ‘Deinstitutionalisation of child care systems in Europe - Transition from institutional to community-based services’. As of 28 May 2018: http://ec.europa.eu/social/main.jsp?langId=en&catId=1248&newsId=9056&furtherNews=yes
United Nations, 1989. ‘Convention on the Rights of the Child’. As of 28 May 2018: https://downloads.unicef.org.uk/wp-content/uploads/2010/05/UNCRC_united_nations_convention_on_the_rights_of_the_child.pdf
cvii European Commission. 2018. ‘Deinstitutionalisation of child care systems in Europe - Transition from institutional to community-based services’. As of 28 May 2018: http://ec.europa.eu/social/main.jsp?langId=en&catId=1248&newsId=9056&furtherNews=yes
cviii European Social Network, n.d. ‘European Expert Group on the Transition from Institutional to Community-based care’. As of 29 May 2018: http://www.esn-eu.org/european-expert-group/index.html
cix European Expert Group on the Transition from Institutional to Community-based Care. 2012. ‘Common European Guidelines on the Transition from Institutional to Community-based Care’. As of 29 May 2018: http://www.socialserviceworkforce.org/system/files/resource/files/Common%20European%20Guidelines%20on%20the%20Transition%20from%20Institutional%20to%20Community%20Based%20Care.pdf
cx European Commission. 2018. ‘Toolkit on the Use of European Union Funds’. As of 29 May 2018: http://ec.europa.eu/regional_policy/en/information/publications/guides/2018/toolkit-on-the-use-of-eu-funds-for-the-integration-of-people-with-a-migrant-background
cxi European Union Agency for Fundamental Rights. 2018. The right to independent living of persons with disabilities’. As of 29 May 2018: http://fra.europa.eu/en/project/2014/rights-persons-disabilities-right-independent-living/publications
cxii Opening Doors , n.d. ‘The campaign’. As of 29 May 2018: http://www.openingdoors.eu/the-campaign/
cxiii Lithuanian working group. 2016. ‘2016–2018 Lithuania’s action plan for participation in international initiative of open government partnership’. As of 29 May 2018: https://www.opengovpartnership.org/sites/default/files/AVP_plans_2016-2018_en%20(1).pdf
cxiv European Commission. 2018. ‘Country profiles - Lithuania: Policies and progress towards investing in children’. As of 1 June 2018 http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3648
cxv European Commission. 2018. ‘Country profiles - Bulgaria: Policies and progress towards investing in children’. As of 1 June 2018 http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3634
cxvi European Commission. 2018. ‘Country profiles - Latvia: Policies and progress towards investing in children’. As of 1 June 2018 http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3647
cxvii Ministry of Social Affairs. 2014. ‘Special Care and Welfare Development Plan for 2014-2020’. As of 29 May 2018: https://www.sm.ee/sites/default/files/content-editors/eesmargid_ja_tegevused/Sotsiaalhoolekannne/Puudega_inimetele/special_care_2014-2020.pdf
cxviii European Commission. 2018. ‘Country profiles - Estonia: Policies and progress towards investing in children’. As of 1 June 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en&intPageId=3639
cxix European Commission. 2018. ‘Country profiles’. As of 30 May 2018: http://ec.europa.eu/social/main.jsp?catId=1248&langId=en
cxx Call for Tenders No VT/2017/057, ‘Belgium – Brussels: Study on the Feasibility of a Child Guarantee for Vulnerable Children’, Tender specification. As of 13.06.2018 http://ted.europa.eu/TED/notice/udl?url=TED:NOTICE:123134-2018:TEXT:EN:HTML
HOW TO OBTAIN EU PUBLICATIONS
Free publications:
• one copy:
via EU Bookshop (http://bookshop.europa.eu);
• more than one copy or posters/maps:
from the European Union’s representations (http://ec.europa.eu/represent_en.htm);
from the delegations in non-EU countries (http://eeas.europa.eu/delegations/index_en.htm);
by contacting the Europe Direct service (http://europa.eu/europedirect/index_en.htm)
or calling 00 800 6 7 8 9 10 11 (freephone number from anywhere in the EU) (*).
(*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you).
Priced publications:
• via EU Bookshop (http://bookshop.europa.eu).
Priced subscriptions:
• via one of the sales agents of the Publications Office of the European Union (http://publications.europa.eu/others/agents/index_en.htm).
|
dbb19b73-6aeb-4309-b6c7-99447e95f2d2
|
CC-MAIN-2021-49
|
http://publications.europa.eu/resource/cellar/f0b92f6a-9abb-11e8-a408-01aa75ed71a1.0001.01/DOC_1
|
2021-12-09T14:09:41+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-49/subset=warc/part-00063-eb7089cf-762b-4a3e-8cab-20b677c0d246.c000.gz.parquet
| 57,419,311
| 19,318
|
eng_Latn
|
eng_Latn
| 0.891061
|
eng_Latn
| 0.997056
|
[
"eng_Latn",
"por_Latn",
"eng_Latn",
"eng_Latn",
"slv_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
125,
379,
595,
1412,
2736,
6330,
7593,
11428,
14723,
15420,
18741,
20879,
22158,
26587,
27622,
29341,
33555,
35630,
38088,
38494,
43034,
45017,
47521,
51877,
52468,
56637,
58753,
61090,
64627,
67183,
70214,
72873,
75861,
78850,
81906,
85071,
85917
] |
CODE OF CONDUCT
Approved by Committee on 25 May 2006
The purpose of this Policy is to establish a standard of performance, behaviour and professionalism for those persons participating in Club activities. In addition, it seeks to deter conduct that could impair public confidence in the honest and professional conduct of the Club or in the integrity and good character of its participants.
Feedback: The Club welcomes any comments on how this, or any of its other policies, can be improved to increase the efficient running of the Club and the enjoyment of the Club's facilities by its members. Please direct you comments to [email protected]
CONTENTS
17. EFINITIONS AND
D
INTERPRETATION..................................................................................... 7
1. PURPOSE
1.1 The purpose of this Policy is to establish a standard of performance, behaviour and professionalism for those persons participating in Club activities. In addition, it seeks to deter conduct that could impair public confidence in the honest and professional conduct of the Club or in the integrity and good character of its participants.
1.2 This Policy takes effect on the date it is approved by Committee.
2. SCOPE
2.1 This Policy applies to the conduct and behaviour of Officials, Coaches, Managers, Players, Parents and Spectators (Participants).
2.2 This Policy does not limit or restrict the application of:
(a) the Member Protection Policy, which establishes the rights and responsibilities of Participants in relation to discrimination, harassment, child protection and intimate relations; or
(b) any other Policies.
3. DISREPUTE, CONDUCT AND BEHAVIOUR
3.1 A Participant must not bring the Club or Football into Disrepute.
3.2 A person will be deemed to have engaged in conduct or behaviour:
(a) regardless of whether or not it was committed deliberately or negligently;
(b) if that person has attempted, offered or encouraged others, to engage in that conduct or behaviour; or
(c) where that person knowingly takes part in the conduct or behaviour.
4. CONDUCT OF EVERYONE
4.1 Without limiting the generality of clause 3.1, a Participant will be taken as having brought the Club or Football into Disrepute if he or she engages, directly or indirectly, in any of the following:
(a) bringing alcohol to, or consuming alcohol in, the public areas of any sports fields;
(b) breaching any of the provisions of this Policy or any other Policies;
(c) communicating directly with the KDSA, Soccer NSW or the FFA or any of their respective directors, officers, employees or other representatives without the express written consent of the Secretary; or
(d) discriminatory behaviour, including public disparagement of, discrimination against, or vilification of, a person on account of an Attribute;
(e) harassment, including sexual harassment or any unwelcome sexual conduct which makes a person feel offended, humiliated and/or intimidated where that reaction is reasonable in the circumstances;
(f) offensive behaviour, including offensive, obscene or insulting gestures or language;
(g) incitement of hatred or violence;
(h) spectator or crowd violence;
(i) intimidation of Match Officials, including use of violence or threats to pressure a Match Official to take or omit to take certain action;
(j) forgery and falsification, including creation of a false document, forgery of a document or signature or the making of a false claim;
(k) corruption, including offering a benefit or an advantage to a Player, Match Official or an Official, in an attempt to incite him or her to violate any Policies;
(l) abuse of position to obtain personal benefit;
(m) the commission or charge of a criminal offence; or
(n) any other conduct or behaviour that materially injures the reputation and goodwill of the Club or Football generally.
5. CONDUCT OF COACHES AND MANAGERS
5.1 Without limiting the generality of clause 3.1, a Coach or Manager will be taken as having brought the Club or Football into Disrepute if he or she fails to comply with clause 5.2 below.
5.2 Coaches and Manager should:
(a) Obtain appropriate qualifications and keep up-to-date with the latest coaching practices and the principles of growth and development of players of the same age and maturity as their Players.
(b) Give all of their Players equal attention and playing time each week. All Players deserve equal attention and opportunity.
(c) Avoid overplaying the talented Players. The 'just-average' Players need and deserve equal time.
(d) Ensure that their Players have fun and enjoy training and playing. Remember that Players participate for fun and enjoyment and that winning is only part of their motivation.
(e) Ensure that the time Players spend with the Coach and Manager is a positive experience.
(f) Be reasonable in the demands they place on their Players' time, energy and enthusiasm.
(g) Follow the advice of a physician when determining when an injured Player is ready to recommence training or competition.
(h) Take into account the age and maturity of their Players when scheduling the length and frequency of practice sessions.
(i) Never ridicule or yell at their Players for making a mistake, not winning their game, not coming first, or for any other reason whatsoever.
(j) Respect the rights, dignity and worth of every Player regardless of gender, ability, cultural background and religion.
(k) Display control, respect and professionalism to all involved in the sport. This includes opponents, Coaches, Officials, Parents, Players, Spectators and the media. Encourage Players to do the same.
(l) Never speak adversely or critically about any Official, Coach, Manager, Parent or Player to anyone other than directly to that person or to an Official, and even then, only in private.
(m) Provide regular constructive feedback to Parents and Players.
(n) Give Players every opportunity to speak openly about their experience as a Player.
(o) Respond to any issue raised by a Parent or Player in a manner which is fair and reasonable, in the circumstances.
(p) Never ostracise any Parent or Player for any reason whatsoever nor encourage or condone such behaviour from any Parent or Player.
(q) Comply promptly with any reasonable direction given by an Official or Match Official.
(r) Operate within the rules and spirit of the sport and teach their Players to do the same.
(s) Teach their Players that the Laws of the Game are mutual agreements which no-one should evade or break.
(t) Ensure that their Players comply with the Laws of the Game.
(u) Develop team respect for the ability of opponents as well as for the judgement of the Match Officials and the opposing coach.
(v) Ensure that all equipment and facilities meet safety standards and are appropriate to the age and ability of their Players.
6. CONDUCT OF PARENTS
6.1 Without limiting the generality of clause 3.1, a Parent will be taken as having brought the Club or Football into Disrepute if he or she fails to comply with the standards of conduct set out in clause 6.2 below.
6.2 Parents should:
(a) Remember that children participate in sport for their enjoyment, not the enjoyment of their Parents.
(b) Encourage their child to participate in Football but must not force them to participate. If they have any concerns about the capability or enthusiasm of their child, they should raise the issue with their Coach or Manager.
(c) Focus upon the child's efforts and performance rather than the overall outcome of the event. This assists the child in setting realistic goals related to his/her ability by reducing the emphasis on winning.
(d) Teach the child that an honest effort is as important as victory, so that the result of each game is accepted without too much disappointment.
(e) Encourage children to always play according to the rules and to settle disagreements without resorting to hostility or violence.
(f) Never ridicule or yell at any child for making a mistake, not winning their game, not coming first, or for any other reason whatsoever. One child doesn't ever win or lose a game – the team does.
(g) Remember that children learn best from example.
(h) Applaud all good performances on and off the field, regardless of which team is responsible.
(i) Respect the decision of Officials and Match Officials and teach children to do the same.
(j) Never argue with the Match Officials or opponents. It sets a very bad example. If any issues arise, they should be left to the Manager to address with the opponent manager, Match Official or the Club.
(k) Never question the Official's judgement and honesty in public. Most officials give their free time and effort for your child's enjoyment. If you disagree with an official, raise the issue through the coach or manager.
(l) Not use any verbal or physical abuse. Support all efforts to remove verbal and physical abuse from sporting activities.
(m) Not offer rewards or praise that does not recognise team efforts. For example rewards for goal scorers are generally not appropriate – what about the pass that set the goal up and the defence that stopped a goal being scored against? Soccer is a team sport and winning takes a team effort.
(n) Show appreciation for, and support, volunteer Coaches, Managers and Officials. They give of their time and resources to provide enjoyment and skills development for your children.
(o) Respect the rights, dignity and worth of every Player regardless of gender, ability, cultural background and religion.
(p) Never speak adversely or critically about any Official, Coach, Manager, Parent or Player to anyone other than directly to that person or to an Official, and even then, only in private.
7. CONDUCT OF SPECTATORS
7.1 Without limiting the generality of clause 3.1, a Spectator will be taken as having brought the Club or Football into Disrepute if he or she fails to comply with clause 7.2 below.
7.2 Spectators should:
(a) Remember that children participate in sport for their enjoyment, not the enjoyment of Spectators.
(b) Applaud all good performances on and off the field, regardless of which team is responsible.
(c) Congratulate all participants on their performance regardless of the outcome of the game.
(d) Respect the Match Officials' decisions. Never argue with a Match Official or an Official.
(e) If there is a disagreement, follow the appropriate procedures in order to question the decision, and teach the children to do likewise.
(f) Never ridicule or scold a child for making a mistake during a game.
(g) Make and encourage positive comments – they are motivational.
(h) Condemn the use of violence in any form, be it by Spectators, Coaches, Managers, Officials or Players.
(i) Show respect for your team's opponents. Without them there would be no game.
(j) Encourage players to follow the rules and the Match Officials' decisions.
(k) Respect the decision of Officials and Match Officials and teach children to do the same.
(l) Demonstrate appropriate social behaviour by not using foul or abusive language or harassing Players, Coaches, Managers, Officials, Match Officials or other Spectators.
(m) Respect the rights, dignity and worth of every Player regardless of gender, ability, cultural background and religion.
(n) Never speak adversely or critically about any Official, Coach, Manager, Parent or Player to anyone other than directly to that person or to an Official, and even then, only in private.
(o) Not use foul language, sledge or harass Players, Coaches, Managers, Officials or Match Officials.
8. CONDUCT OF PLAYERS
8.1 Without limiting the generality of clause 3.1, a Player will be taken as having brought the Club or Football into Disrepute if he or she fails to comply with clause 8.2 below.
8.2 Players should:
(a) Play by the Laws of the Game;
(b) Never argue with a Match Official. If you disagree with a referee, have your Coach or Manager approach the Match Official during the break or after the game;
(c) Never verbally or physically abuse any Official, Match Official or Participant, whichever side they are on;
(d) Control their temper.
(e) Never sledge other players, or deliberately distracting or provoking an opponent.
(f) Always work hard for yourself and for your team. Your team's performance will benefit and so will you.
(g) Be a good sport.
(h) Applaud all good plays, whether they are from your team or not.
(i) Treat all Players as you would like to be treated.
(j) Do not interfere with, bully or take advantage of, another Player, whether they are a teammate or not.
(k) Respect the rights, dignity and worth of every Player regardless of gender, ability, cultural background and religion.
(l) Participate for their own enjoyment and benefit, not just to please Parents, Coaches, Managers or Spectators.
(m) Co-operate with your Coach, Manager, other Players and opponents. Without them there would be no game.
(n) Don't make any isolated incidents of unsporting behaviour the highlight of the event.
(o) Never speak adversely or critically about any Official, Coach, Manager, Parent or Player to anyone other than directly to that person or to an Official, and even then, only in private.
9. CONDUCT OF OFFICIALS
9.1 Without limiting the generality of clause 3.1, a Player will be taken as having brought the Club or Football into Disrepute if he or she fails to comply with clause 9.2 below.
9.2 Officials should:
(a) Modify rule and regulations to match the skill levels and needs of young people.
(b) Compliment and encourage all participants.
(c) Be consistent, objective and courteous when making decisions.
(d) Condemn unsporting behaviours and promote respect for all opponents.
(e) Emphasise the spirit of the game rather than the errors.
(f) Encourage and promote rule changes which will make participation more enjoyable.
(g) Be good sports.
(h) Keep up-to-date with the latest trends in officiating and the principles of growth and development of young people.
(i) Be positive, encouraging and supportive.
(j) Place the safety and welfare of the Participants above all else.
(k) Give all young people a fair go regardless of their gender, ability, cultural background or religion.
10. BETTING, MATCH-FIXING AND CORRUPTION
10.1 A Participant must not engage, directly or indirectly, in:
(a) any bet, wager, gamble or any other form of financial speculation where the relevant person stands to win or gain from the win, draw or loss of any Club competing in a Match;
(b) the throwing or fixing of a Match; and
(c) any conduct or behaviour intended to unfairly affect the result of a Match, including accepting or agreeing to accept any money, gift, consideration or benefit (whether in cash or kind) connected with or relating to the ability of a Participant to exercise control over or influence the outcome of a Match so as to bring about a result other than that which would be achieved in a fair contest between the competing teams.
10.2 A Player, Coach, Manager, Official and Match Official must not:
(a) accept bribes through the offer, promise or acceptance of a gift or any other benefit (whether in cash or kind) in return for violating his or her duties; or
(b) provide any information for benefit or reward concerning the Club, its team's actual or likely composition, the form or injuries of Players or possible tactics (other than in connection with a bona fide media interview).
10.3 A Participant must immediately report to the Club any offer of a bribe or any attempt by a person in breach of this clause 10.
11. MEDIA STATEMENTS
11.1 A Participant must not make any statement in public, including any contribution to television, radio or print media that:
(a) is disparaging of a Match Official, opposition team or any Player or Official;
(b) is disparaging of the Club, any Club regulation or policy decision;
(c) comments on any matter currently the subject of the Grievance Procedure; or
(d) materially injures the reputation and goodwill of the Club or Football generally.
11.2 A Participant must not make or issue any public or media statement or release that incorporates a reference to the Club, or attributes any quote to the Club, without the Club's prior written consent.
12. SANCTIONS
12.1 Any Participant which breaches any provision of this Policy will be subject to sanctions and/or fines in accordance with the Disciplinary Policy.
12.2 The Club will determine the scope and duration of each sanction, and the quantum of each fine in accordance with the Disciplinary Policy.
12.3 Any decision of the Club will be binding on the Participant.
13. DUTY OF DISCLOSURE
A Participant must promptly report to the Club any breach of this Policy or any unethical incident involving others who are bound by this Policy.
14. NOTICE AND RIGHT TO BE HEARD
The Club may enforce the terms of this Policy and invoke the sanctions only if it has given the party alleged to have breached this Policy:
(a) reasonable and sufficient notice of each and every particular of the alleged breach;
(b) notice of possible sanctions; and
(c) the opportunity to be heard and to make submissions in relation to that alleged breach.
15. GRIEVANCE PROCEDURE
15.1 If a Participant disputes the Club's purported action taken under this Policy, that party must give notice to the Administrator of the Grievance Procedure:
(a) within 14 days after the date on which the purported action was taken; and
(b) specifying the reason for the dispute and any relevant facts.
15.2 Any purported action taken by the Club under this Policy will not take effect until the Grievance Procedure has been terminated or exhausted.
16. TIMEFRAME
16.1 Unless exceptional circumstances can be established, an action for breach of this Policy must be brought within three (3) months from the time the subject matter of the breach was brought to the attention of the Club.
17. DEFINITIONS AND INTERPRETATION
17.1 In this Policy:
Administrator means the person appointed by the Club from time to time to administer the Grievance Procedure and to present the facts and evidence at hearings.
Attribute means race, colour, religion, language, politics, national or ethnic origin, gender, transgender, sexual orientation, age, marital status, pregnancy or intellectual or physical impairment or any other attribute specified under commonwealth or state legislation.
Club means Kissing Point Soccer Club.
Coach means a person appointed by the Club from time to time to coach teams of Players. The name and contact details of all Coaches are listed on http://www.kpfc.asn.au.
Code of Conduct means this document as amended from time to time (a current version of which can be obtained on http://www.kpfc.asn.au).
Committee means the Committee of the Club. The members of the Committee are identified on http://www.kpfc.asn.au.
FFA means the Football Federation of Australia.
Disrepute means any conduct, statement or appearance in public that is damaging to reputation, including by being defamatory or critical without reasonable basis or justification.
Grievance Procedure means the procedure that applies exclusively to facilitate the expeditious and fair resolution of disputes or grievances that arise between the Participants, as promulgated by the Club from time to time (a current version of which can be obtained on http://www.kpfc.asn.au).
KDSA means the Ku-ring-gai District Soccer Association.
Manager means a person appointed by the Club from time to time to manage teams of Players. The name and contact details of all Managers are listed on http://www.kpfc.asn.au.
Match means any match staged or participated in by the Club, including any pre or post season, trial or exhibition match.
Match Official means a referee, lines' man, match commissioner, referee inspector, selector, any person in charge of safety or any other person appointed by the Club or the FFA or a State Federation or District Association to assume responsibility in connection with a Match.
Official means:
(a) an employee, consultant, officer or director of the Club; or
(b) a member of a council, committee, panel or body constituted by the Club.
Parent means a person that has parental responsibility for a Player who is under the age of eighteen years (18).
Participants has the meaning ascribed to it in clause 2.1 above.
Player mean a person registered to play soccer with the Club.
Policies means the Club's constitution and by-laws and the rules and regulations, codes, policies and procedures as developed or implemented by the Club from time to time (current versions of which can be obtained on http://www.kpfc.asn.au) or by FFA, Soccer NSW or KDSA from time to time (as they each relate to the activities of the Club and its Participants) (current versions of which can be obtained on their respective websites), including the Laws of the Game.
President means the person appointed to the office of President of the Club. The name and contact details of the President are listed on http://www.kpfc.asn.au
Laws of the Game means the official Laws of the Game as promulgated by FIFA from time to time.
Secretary means the person appointed to the office of Secretary of the Club. The name and contact details of the Secretary are listed on http://www.kpfc.asn.au
Vice President means a person appointed to the office of Vice President of the Club. The name and contact details of all the Vice Presidents are listed on http://www.kpfc.asn.au
Spectator means any person attending any sports field.
17.2 In this Policy:
(a) any use of the word 'includes' or words such as 'for example' or 'such' do not limit anything else that is included in general speech;
(b) 'day' means a day when the offices of KDSA are ordinarily open for business; and
(c) all notices must be in writing and in English.
17.3 The Club will interpret all terms of this Policy and any other Policies and any such interpretation will be final and binding on each Participant. The Club may issue guidelines to assist in that interpretation.
17.4 The Club may vary this Policy from time to time or make such further rules as it deems fit.
|
<urn:uuid:413ebe5e-b799-4737-99dd-f972e1e67087>
|
CC-MAIN-2019-09
|
http://kpfc.asn.au/wp/docs/kpfc_code_of_conduct.pdf
|
2019-02-19T14:27:21Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247490225.49/warc/CC-MAIN-20190219142524-20190219164524-00545.warc.gz
| 151,615,372
| 4,613
|
eng_Latn
|
eng_Latn
| 0.994041
|
eng_Latn
| 0.995461
|
[
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
652,
788,
3449,
6385,
9379,
12184,
14502,
17402,
20373,
22110
] |
UAMS
Information on Waldenstrom Macroglobulinemia
What is Waldenstrom Macroglobulinemia?
Waldenstrom macroglobulinemia (Waldenstrom's) is a cancer of B lymphocytes (a type of white blood cell) that starts in the immune system.
Immune system cells make up the lymphoid tissue that is present throughout the body and that helps protect the body from infection. The main cells of lymphoid tissue are referred to as lymphocytes.
A feature of Waldenstrom's is the overproduction by B cells of a protein called monoclonal immunoglobulin M (IgM, or macroglobulin) antibody, which circulates in the blood. The buildup of IgM can cause the blood to become too thick. This is called hyperviscosity. It can make it harder for blood to flow through small blood vessels and can cause symptoms of Waldenstrom's, such as problems with vision and the nervous system.
There are two main types of lymphocytes.
B lymphocytes (B cells) respond to an infection by changing into plasma cells. Plasma cells make proteins known as antibodies or immunoglobulins that help the body attack and kill disease-causing germs like bacteria. T lymphocytes (T cells) help direct immune responses and also can directly kill invading germs.
In Waldenstrom's, one of the B cells transforms into a cancer cell, which then multiplies out of control. Waldenstrom's cells can grow in the liver, spleen and lymph nodes, causing them to swell. They can also grow in the bone marrow, crowding out normal cells. When this happens, levels of red blood cells (which carry oxygen through the body) and white blood cells (which help the body fight infection) may fall. Levels of platelets, a type of blood cell that is responsible for clotting and stopping bleeding, also may fall.
Waldenstrom - update for reprint.indd 1
The cancer cells of Waldenstrom's are similar to those of two other types of cancer: multiple myeloma and non-Hodgkin lymphoma. Multiple myeloma is a cancer of plasma cells; non-Hodgkin lymphoma is a cancer of lymphocytes. Waldenstrom's cells have features of both plasma cells and lymphocytes; Waldenstrom's is a lymphoplasmacytic lymphoma.
Key Statistics
Waldenstrom's is rare. About six people per one million are diagnosed each year in the United States; between 1,000 and 1,500 people are diagnosed annually.
The chance of developing Waldenstrom's increases with age. Waldenstrom's mainly strikes individuals age 65 and older and most often affects white males.
It is considered a low-grade, or indolent, lymphoma; it spreads slowly and can be wellcontrolled when diagnosed early.
11/6/15 7:29 AM
Causes
No definite cause for Waldenstrom's has been identified. However, environmental, familial, genetic, and viral factors might play a role. About one in five people with Waldenstrom's has a close relative with Waldenstrom's or a related B-cell disease, such as MGUS (monoclonal gammopathy of undetermined significance) or some types of lymphoma or leukemia.
Certain changes in the DNA inside normal lymphocytes can cause them to become lymphoma or multiple myeloma cells. Changes in the DNA of some lymphoma cells can also cause them to produce high levels of IgM, leading to symptoms of Waldenstrom's. The DNA changes in Waldenstrom's cells are usually acquired after birth, versus being passed on from a parent. They often occur for no clear reason.
Waldenstrom's cells frequently have a mutation in a gene (genes are comprised of DNA) known as MYD88, which normally helps immune system cells signal each other and helps keep them alive. It is possible that the DNA change in this gene might make it stay turned "on" all the time, helping the Waldenstrom's cells survive longer than they should. Myeloma Institute scientists are investigating the factors that cause some genes to stay "on" and others to stay "off."
Symptoms
The overgrowth of B cell lymphocytes in Waldenstrom's inhibits the growth of normal cells, resulting in low numbers of red blood cells, white blood cells, and platelets, which can lead to fatigue, frequent infections and excessive bruising or bleeding. The abnormal lymphocytes also grow in the liver and spleen, which can cause the organs to become enlarged and result in abdominal pain.
Symptoms of Waldenstrom's can include:
Fatigue
Nose bleeding
Bleeding of the gums
Blurred or decreased vision
Easy bruising of the skin
Dizziness, headache, confusion
Numbness or tingling in the hands or feet
Fever and night sweats
Weight loss
Swollen lymph nodes
Waldenstrom - update for reprint.indd 2
Heart palpitations
Abdominal pain
Swelling in the feet and legs
It is possible for a person to be asymptomatic and yet, based on high levels of IgM, be diagnosed with Waldenstrom's. Sometimes Waldenstrom's produces few symptoms and develops slowly.
Diagnosis
The presence of IgM protein in the blood is a characteristic feature of Waldenstrom's. It is often discovered when a person goes to the doctor because of overt symptoms or just not feeling well. Sometimes it is found in people without symptoms who have blood work done for other reasons.
A diagnosis of Waldenstrom's is confirmed by performing a bone marrow or lymph node biopsy to determine whether abnormal lymphocytes are present. Additionally, specialized blood tests, such as serum protein electrophoresis, and urine tests are used to detect IgM protein and low blood cell counts.
Molecular genetic tests might be done to look for specific chromosome or gene changes.
Treatment
Treatment is based on an individual's symptoms and complications. Selection of treatment may be affected by factors such as age, general health and the type of symptoms. Not everyone with Waldenstrom's needs to be treated right away. Often, people who do not have serious or bothersome symptoms can be watched closely and then treated later, if needed. If treatment is needed, there are several options.
Chemotherapy, including chlorambucil (Leukeran), cladribine (Leustatin), cyclophosphamide (Neosar), and fludarabine (Fludara), alone or in various combinations
Monoclonal antibodies, including Rituxan® (rituximab), which attaches to proteins on the surface of lymphoma cells and causes the cells to die
Biological therapies designed to develop antibodies that destroy tumor cells
11/6/15 7:29 AM
Proteasome inhibitors, such as Velcade® (bortezomib) or Kyprolis®(carfilzomib)
Immunomodulating drugs (IMiDs), such as Thalomid® (thalidomide), Revlimid® (lenalidomide), and Pomalyst® (pomalidomide) that alter the environment of the tumor cells, prompting them to die
Targeted therapies that use small molecules to block pathways that enable cells to survive and multiply
Plasmapheresis (plasma exchange) to lower blood viscosity caused by high levels of IgM
High-dose chemotherapy with stem cell transplantation
Radiation therapy to shrink enlarged spleen or lymph nodes if they are causing problems
Most patients can be treated on an outpatient basis. Physical examinations, routine blood chemistry evaluations and tests for serum paraprotein level, serum viscosity and coagulation are performed periodically to monitor for disease progression and to aid in treatment decisions.
Waldenstrom - update for reprint.indd 3
It is important for patients and doctors to discuss all possible treatment options and related side effects in order to make the best decision that suits each individual's needs. No single treatment works for all patients. If the first drug or set of drugs does not work effectively, other drugs can be tried.
Prognosis
Duration of survival for Waldenstrom's patients has increased over the years, with reported median survival of up to 20+ years. Survival rates are based on reported outcomes of large numbers of people, but they cannot be used alone to predict the likely outcome for any particular person, since each person's cancer responds differently to treatment. It is important that patients speak with their doctors about their specific situations.
Future
In recent years, much progress has been made with the development of new drugs that work effectively. Ongoing scientific research is bringing about advanced, targeted treatment options and improved outcomes.
This information about Waldenstrom Macroglobulinemia and other patient education materials are available at www.myeloma.uams.edu
11/6/15 7:29 AM
NOTES:
Waldenstrom - update for reprint.indd 4
University of Arkansas for Medical Sciences Little Rock, Arkansas www.myeloma.uams.edu
11/6/15 7:29 AM
|
<urn:uuid:57b28bc1-1f36-4468-9fda-546dcbab156f>
|
CC-MAIN-2017-26
|
http://myeloma.uams.edu/wp-content/uploads/sites/4/2015/07/Waldenstrom.pdf
|
2017-06-22T11:59:35Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319265.41/warc/CC-MAIN-20170622114718-20170622134718-00398.warc.gz
| 293,910,501
| 1,910
|
eng_Latn
|
eng_Latn
| 0.838357
|
eng_Latn
| 0.996598
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2592,
6283,
8339,
8505
] |
4-3-1952
The Wooster Voice (Wooster, OH), 1952-04-03
Wooster Voice Editors
Follow this and additional works at: https://openworks.wooster.edu/voice1951-1960
Recommended Citation
Editors, Wooster Voice, "The Wooster Voice (Wooster, OH), 1952-04-03" (1952). The Voice: 1951-1960. 28. https://openworks.wooster.edu/voice1951-1960/28
This Book is brought to you for free and open access by the "The Voice" Student Newspaper Collection at Open Works, a service of The College of Wooster Libraries. It has been accepted for inclusion in The Voice: 1951-1960 by an authorized administrator of Open Works. For more information, please contact [email protected].
KING, GEIGER TO EDIT MAJOR PUBLICATIONS
Pageant Features 'Magic Shoe' Journey
The Magic Shoe" will be the pageant for this year's Color Day. Written by Ivan Preston and Ron Felty, it emerged the favorite after Barbara Fisher's entry "A Bit of Heather" from the Student Senate-appointed script judging committee last Thursday.
The pageant depicts a boy and girl following the rainbow to find the pot of gold at the end. Then happens an old woman who tells them that there is no pot of gold, but that at the end of the rainbow is the most beautiful girl in the world.
Travelling in an old shoe, the boy and girl stop at six nursery rhyme scenes.
The co-authors are both junior English Majors and members of Second Section. Preston is a member of the staff of the INDEX and editor of the staff of the INDEX and editor of the present Student Directory. He lives in Pittsburgh, Pa.
Fely is a varsity guard in basketball and lives in town, in Ironton, Ohio.
Bill McGraw chaired the committee which selected the play. He is Barbara Fisher, Walter, Bob Joliff, Miss Frances Guille, William Gun, and Donald Shanower were the other members of the committee.
Director Felty Completes Casting for "Magic Shoe"
Ron Felty, director of the Color Day pageant, and his casting committee have selected through tryouts the 21-person cast for the nursery rhyme fantasy to be produced May 10.
Tom Hugbart will narrate the program. Eight other voice parts round out the cast. The remaining roles are: Elliott speaks as Edward, Ginger Ferris as Ruth, Bob Hull as Jack Be Nimble, Joyce Westerman as Old Woman, Patrice and Bill Parsons as Simple Simon, Fred Wollenhaupt as Pancho Diablo, and Sandy Wishart as Humpty Dumpty.
The pantomime will be acted by Tom Wise (Edward), Sylva Spencer (Ruth), Ted Biedron (Jack Be Nimble), Betty Burt (Old Woman), Bob Davies (Pancho Diablo), Dick Shepard (Simple Simon), Bill Parsons (Mire), Betty Parti (Cat), Jan Hitchcock (Lil' Jack Horner), D. D. Mellon (Old King Cole), and Bill Gaber (Ginger Porridge).
Rehearsals for the cast begin immediately after vacation.
Marvin Schuetzler, Joan Waters, and Bill McGraw assisted Felty in choosing the cast.
Dodds Lecture Considers 'Aspirin' Here April 24
"Human Values in an Aspirin Age" will be the topic of a lecture here on April 24 by Dr. John W. Dodds, professor of English at Stanford University, Stanford, California.
A Wooster alumnus, class of 1924, he received an honorary degree of honoris causa from a chapel convocation in 1945. However, his membership in the college "family" goes back to 1818 as his father, the late Dr. Samuel Dodds, taught Biblical Theology at Wooster until his retirement in 1931.
Professor Dodds received his Ph.D. at Yale in 1926 and his M.A. in 1927. He received his Ph.D. there in 1932. He taught English at the University of Pittsburgh before going to Stanford in 1937 where he became a full professor in 1940. He founded the Stanford University School of Humanities in 1942 and was its dean until 1948. At present he is in leave at Emory University, Georgia as Guest Lecturer.
As an author he has written "The Foundations of Modern Criticism," "Thucydies: A Critical Portraiture" published in 1941. His newest book is "The Age of Aspirin: A Biography of England, 1840-1870." Professor Dodds has edited, with Arnold Whitridge, "An Oxford Anthology of English Literature," and Gardiner C. Craig, "Tips of English Prose," and in 1947, "Modern British and American Prose" with W. H. Dunham.
Publications Problem Reviewed By Senate
Student Senators considered the future of the Publications Committee at a meeting last Monday night. The discussion centered on whether the committee should have a faculty or a student chairperson and on a clarification of the present stand of the committee as to its function.
The discussion was preceded by a report from the Publications Committee concerning the appointment of Dirk Shephard as next year's INDEX Manager, and George Bender as Advertising Manager of the VOICE. Don Overstreet, INDEX Business Manager, had suggested at the Publications meeting that existing salaries be abolished and some other method of credit be used.
A committee appointed by the Chairperson of the Publications Committee to investigate other means of compensation.
President Elwood L. Cook, the president of the Publications Committee as to its function: "The Publications shall have no control over any policy, but shall advise on literary style, form, and good taste." Senator Bob Arwell suggested that with a student chairman the faculty would not be involved in censorship — censoring the VOICE, in particular — and that the arrangement would relieve the Administration of some of their burden.
Present membership of the Committee was also explained by President Perry. It consists of three student chairpersons appointed by the Dean of the College and the Student Senate President, a faculty member from the economics department, editor and business manager of both INDEX and VOICE, a student retiring seniors from the faculty or a student chairperson, and a clarification of the present stand of the committee as to its function.
Bender, Shephard Head Business Staffs
Student editors of the VOICE and INDEX for the school year 1952-1953 were named by the Publications Committee last week. Howard King was confirmed as editor-in-chief of the VOICE, while Reed Geiger was named to the top INDEX post.
As replacements for Jean Mosley, George Bender was appointed Business Manager of the VOICE and Dick Shephard was given the same position on the INDEX.
King, a junior majoring in Political Science, served as Associate Editor on this year's staff of the VOICE, assuming the position when the resignation of Jean Mosley. The new editor is a member of First Section and makes his home in Wooster.
Reed Geiger is a sophomore from Lakewood, Ohio, and a member of Second section. He has been a member of the staff of the 1952 INDEX, serving as an assistant editor.
Bender, who will handle the books for the VOICE, is a junior from New Philadelphia, Ohio. A member of Second section, Geiger served in Autumn this year.
Shephard takes over the financial work of the INDEX following his service as Advertising Manager of the 1952 book. Advertising is a sophomore from West Carrollton, Ohio.
Under a recent ruling the Publications Committee, the new body, will begin operation following Spring vacation. Other staff positions for both publications will be announced later.
Singing Sections Compete May 2
Eight sections will compete in the Serenade Contest to be held on May 2 for the silver plaque awarded by the Little Theater Guild. Don Shaver will be master of ceremonies for the evening's festivities.
Section song leaders are: First, Dick Snyder, Second, Jim Hughes, Third, Bob Bender and Tom Feltz, Fourth, George Breakwell, Fifth, Gil Bloom, Sixth, Dick Carter, Seventh, Bill Oestreich, Eighth, Ellis Campbell.
Judges will be Mrs. Margaret Goldier, Miss Eve Richmond, Mr. Karl Trump and Mr. Frederick Moore.
Summer School Opens June 10; Catalogue Ready
Fourteen departments will offer a total of 43 courses in the College's 1952 summer session opening June 10, according to the latest news.
Catalogues of the courses are available in the Registrar's office, and prospective students who find that they wish to register but are not listed are asked to see Professor Lowell W. Goodloe, Dean of the summer session, in the English Department.
Registration for students now enrolled will be held May 5-7, before the start of the advanced registration in the fall semester. Eight or nine credits may be earned in the eight week session, which ends August 2.
'Doc' Schreiber Switches To English Again After 6 Month German Tour
Professor William I. Schreiber, head of the German Department, just has returned to Wooster after a six month research leave to Germany. As one means of learning more about their culture, Professor Schreiber has returned to lecture in the United States Centers of Instruction, or "America Houses," throughout Europe.
America Houses are rather like modern World Fairs, according to Professor Schreiber. Libraries, lecture, exhibits and films, fairs, kindergartens, and in Munich, a small model American kitchen, help to bring the whole range of America to these American citizens. European universities and the primary group involved by the centers.
Professor Schreiber received his lecture assignments from the Speakers Bureau of HICOG. His subjects ranged from The Development of
(Continued on page four)
Charles Taft Keynotes Conference at Student GOP's Battle Here April 30
Charles P. Taft, brother of Ohio Senator Robert A. Taft and candidate for the Republican nomination for governor of the State of Ohio, will be the keynote speaker for the mock Republican convention to be held here on April 30.
Convention of Mr. Taft as speaker came on Tuesday after a series of telephone calls between Mr. Taft and Mr. Marion Ewing, Wayne County Republican Committee Chairman.
A graduate of Yale Law School, Mr. Taft has been a prominent Cincinnati lawyer since 1920. He has been practicing attorney of Hamilton County, an original member of the Cincinnati City Charter Commission, and an alternate member of the Cincinnati City Council. In 1947, he was elected president of the Federal Council of Churches for the next year. During the last war, he served as director of Community War Services for the Federal Security Agency. Throughout all his life he has displayed an active interest in local political and religious projects.
General Chairman Walter Wolf announced this week the committee chairman for the four-day convention. The convention committee will be in charge of the Organization Committee, Charles Arden will lead the Rules and Order of Business Committee, Boyd Cook will lead the Permanent Organization Committee; and Frank Cook will oversee the Credentials Committee.
Several changes in the state delegation chairman were also announced recently by Wolf. Brian Underwood will be the Arkansas chairman; Lincoln Granger, Minnesota; John Low, Ore.; Joseph Carney, New Bedford, Mass.; and Loren Shearer, District of Columbia.
The convention is scheduled to begin with an afternoon session for debate on the platform beginning at 3:30. The evening session will begin with a dinner and toast to keepers, followed by a 7:00. Nominations for the President and Vice-President will begin immediately after the keynote speech.
Glee Club Names Allen President
Mark Allen was elected president of the Men's Glee Club Monday afternoon by a vote of five to one in favor of the year. The executive board of the club will meet next week except for new officers to be chosen from the freshmen members. A new business manager will be appointed from the freshmen members.
Among other business discussed by the Glee Club was the possibility of taking a trip along Skyline Drive to Florida next year.
Systems Without Honor?
As we were trying to redistribute the mass of waste paper which constantly accumulates in the pages of THE VOICE, on the other day, we came across a letter, which, although unsigned, contains such a profusion of fallacious reasoning concerning the honor system that we are taking the liberty of reproducing part of it. The following is what the writer explains how he feels the system is working (which of the misguided souls will begin to copy his "A" neighbor's paper"), he goes on to say:
"As long as we can remember, we have been taught not to 'tattle-tale.' We found that when we tattled on our best friend we often lost his close friendship and also got a scolding from our parents for breaking the rule. The honor system is a complete reversal of this picture, forcing students to tattle on their friends.
Is there one of us who has not, in desperation, been tempted to glance at the neighbor's paper? Why didn't we do it? Because the pod was their watchword. He was to be a good friend, but also represent authority and, if a warning fails, he has the long accepted power of judgement over those he has warned. It was not your personal standard or a no cheating policy that has kept me from the crime; it has been the presence of the one power of authority, and not a lot of little, undisciplined powers, who has kept you under control.
In at least one of the girls' dorms at the beginning of every year, the honor system breaks down in regard to quiet hours. The system always fails, and so does the full force, or at least until each student becomes so immune to her conscience that she will do anything to her dorm-mates in the name of the law."
Without taking issue with this writer we said, we would like to point out some of the logical consequences of such an attitude in either defense for the system are reminded once again of the Time magazine article entitled "Group-Think," in which our society is criticized for its lack of creativeness and our love of "the system." This letter expresses the very thing that inspired the group-think articles, that is, the inherent lack of self confidence and non-creativity.
In any case, we feel that it is a mistake to conform to a useless and outmoded standard such as the "I will not tattle" philosophy. We are in this school because we have supposedly reached the age of common sense, because we are expected to be able to make our own decisions without having someone look over our shoulders all the time.
Every day we complain because we are not given enough freedom. We don't like to be told when to come home, when to go bed, when to go to church or chapel. Yet when we are given one chance to do something, on our own, we fumble and complain because "we don't want the responsibility."
The question we would like to pose is: How can we ever expect to be given more freedom, more chances to deal with our own environment as a guide, when we refuse to accept the responsibility which logic and common sense require? Until we are willing to assume this responsibility, we have no right to ask for the revision of any rules that we might feel to be oppressive or unfair.
— H. K.
So The Bands Play On
The Student Senate recently improved its policy of union bands for all dances on campus by adding enforcement power to the policy adopted last year ago. The administration has backed up the Senate's stand. The policy is the only practical one possible under the existing circumstances.
Immediate reaction to the American Federation of Labor musicians' union statement cannot be considered as being regarded as one which is to benefit union bands. But Senate experience has found this position untenable. When the campus was blacklisted by the union because one group had employed a nonunion band for a dance, last year, the result was to hire two union bands. But it soon became that the number of such bands in this area is insufficient to meet the needs caused by the calendar of dances.
Last year's Senate was thus forced to advocate that all organizations on campus contract only union bands. They formed this recommendation on the assumption that dances were still wanted and on the fact that nonunion bands could not perform for the number of dances wanted.
This year's Senate has added teeth to the policy. It clears all band contracts to make certain that its policy is not violated. Its Dance Band Committee automatically approves any union band (and is armed with a list of union bands to help organizations select a band).
Two things must guard against violation of this plan. If a nonunion band is contracted, the campus organization must pay the band, but must cancel the dance. If this stipulation is circumvented and a nonunion band plays for a dance, then the organization sponsoring the dance must pay for the social activities for a period to be determined by the Student Senate.
The Senate has made the policy of one year's standing a real one — one with power to compel its observance. The plan protects each organization from being blacklisted through short-sighted action by another organization on campus.
Forced into a corner by the musicians' union, the Senate and the Administration have prudently taken the only stand that will provide the campus with a variety of dance music.
— R. D.
Say Something!
by Nell Maxwell
There is the dead quiet of a haunted house on a summer's night when the moon is full, when the crickets are chirping, when the owl hoots over the hill. There is the unendured uncomfortable silence that descends upon a conversation when some one else's soul impinges after the boyfriend who has recently gone the way of all boyfriends, and the girl is searching another number for his coke date. There is the whispering hush of a funeral parlour when the poor lives leave over their loved ones.
But all these are as nothing compared to the unutterable horror of the thick oppressive stillness of a campus week factory. The library (really a mental institution) title—a deceiving one to apply to such a monster—should be written THE LIBRARY. Although even that is not enough to express the awesome solemnity of the row, the row of rows who pore lives over their books. Their side-long glances andfurtive whispers are wounds of the soul, and shall be heard at the Judgment before the great throne of God, awaiting their sentence with the knowledge that it will be everlasting damnation.
There are those, it is said, who can actually read in such an atmosphere, though few, it is reported, who prefer this impersonal air to that of some more friendly place where the sphere of Sleep lurks in the shadow of a student who refuses to go to bed at a conventional hour.
Those who cannot study in this place of stolen conversation, rustling pages, and echoing footsteps are not quite so fortunate. The music room, the "dormitory," the Study, or the Union are provided with comfortably noisy places to study in for a while, but the inevitable, in the form of reserve books, must sometime catch up with them.
These unfortunates may thus have their hell on earth and perhaps who knows—eternal torment and punishment that was. But a hell in the hereafter would at least be filled with the screams of the tormented ones, one dares hope, who have some comfort in the consciousness that other lost souls were kept from the torment. And when these condemned to expiration here, there is nothing quite so full of terror as the picture of a room filled with three forms which seem dead, all the while reason screams that they must be alive, that they must be capable of movement.
We are currently engaged in the task of revising the name of the Publications Committee as well as the operational statutes for the VOICE and the INDEX. The aim of the current revision is to bring these documents up to date and more in line with practice.
The current student petition demands the need for a clarification of the manner in which student publications are held responsible to our college community. It is hoped that this letter has helped serve this purpose.
Sincerely,
Joe H. Blandley, Chairman
Publications Committee
More On: Authority
Dear Editor:
It is strange how seemingly unrelated news items such as "Carnegie Press Visits Campus For Week-end," and "Student Petition Spurs Debate On College Publications Policy" (Wooster Voice March 21) do in the larger view have subtle relationships.
Two incidents in a letter to the editor (Wooster Voice March 21) ask among other questions 1) the difference between advice and counsel, and 2) the source of administrative power. I would like to quote in answer to this, from an address by Mr. Chester I. Barnard, President, Rockefeller Foundation, at a meeting of the National Association of Deans and Advisers of Men at Williamsburg, Virginia, March, 1950. The title of his address was "Authority."
"My views on the subject of authority ... I don't suppose were original but they certainly were not orthodox, because I have insisted that the fundamental source of authority comes from the bottom and never comes from the top ... I suppose that this revolutionary departure from the top is responsible for more difficulty in international and national affairs, and in schools, businesses and homes, than arises from any other single source."
Mr. Barnard goes on to support his opinion that authority comes from the bottom. "Let us distinguish between the subjective aspects of authority. If you have an intellectual or an emotional respect for that person or she cannot understand, it obviously can have any authority. You can't get anything done unless you are able to communicate it. Perhaps at least fifty per cent of the art of communication lies in the listener, the one who is supposed to receive the message. The other aspect of authority which Tolstoy was well aware of, and that is the requirement of innovation or an order has got to be able to carry it out ... You will find all the great business men, and I think through the educational world if you look carefully enough, that the ones who get the orders are given in good faith, which are so irrelevant to the actual concrete situation that they can't possibly be carried out, and frequently they are not ... People have to know what they know, what leaders or what rulers do not pay attention to—in the Army, the Navy, and other organizations. They learn what is really important, and, for the most part, what people are willing to do depends upon their sense of what is fit to do."
In order to secure order there has to be a formal and objective scheme of authority. The authority that comes from the bottom is the authority of the obeying, whereas the hierarchy, the necessity for the commandant ... The question of responsibility, which is so closely related to responsibility is persuasion by condition and education. Condition means people they can act on their own responsibility and own authority ... the last part of education is persuasion in expositions. That is another form of persuasion. The intellectual appeal.
Finally, I would put in the class of persuasion—perhaps by stretching the word too much—what is implicit in a good deal of what I have already said, and that is the art of creating the conditions of autonomous functioning. The great battle between the totalitarianism and the democratic liberals is this: what to exact what can be done by formal direction attain results as against creating and developing and permitting autonomous organizations which operate on their own responsibility?"
I believe that each generation seeks better to Wooster. An essential part of the better student body and administration is that any teamster of this would say "I run across your house in when he is doing an uphold." We go to an American history class and learn of separation of the church and press from the state; we go to a compulsory chapel and read a philosophical paper. We go to introductory philosophy class and learn philosophical fallacies; in defense of administrative policies we are given an argument ad hominem. Is it small wonder that we are confused amid these incongruities?
Sincerely yours,
R. J. Ross
Scrawls of Ivy
THIS WEEK has been the best time of year for intramurals, with both an afternoon and evening sport under way. At this writing, Fifth, Second, and Sixth have led the way on the volleyball court, with the Phi Deltis undefeated a few games. It's easy the way they do it, with such big boys as Tom McArthur, Jack Holt, Dick Paige, Dick Milligan, and John Welsh. Second has Bob Winters, Bob Kline, and Jack Johnson, while Sixth has some 5-footish but spikyers are Don Leber, Carl Fleming, Vern Nettley, and Canon. The winners will be decided before this issue comes out, but not in time to put in print.
ON THE SOFTBALL FIELDS all is not well. Everybody would rather have a game going around of just a practice, but when the score comes out something like 14-13 they should realize they've jumped the gun a bit. There probably won't be any ball games worth watching until a couple weeks after vacation when the pitchers settle down and the fielders finally locate the handle on the till. Till then—no hits, many runs, and many errors.
MINCY BUSACK, State Basketball captain in 1949, has done something to make his old coaches very proud of him. Himself a coach, Mincy recently led Oregon's Rogue River High School to victory in Class A Basketball tournament championship. How did he get so far away from home? Mincy tells us that "Mincy just got in his car and didn't stop until he found himself in Oregon." Some of this year's coaching prospects who may have to do a bit of traveling before they settle down are Tom McCutchion, Paul Steiner, Wes Gile, and Al Van Wise.
WHY GET EXCITED about the Indians' home opener on the 18th when you can see the Scots open up on a whole day earlier! The Maulding Methodists (Ohio's Rogers River High School) will play Class B Basketball tournament champions. How did he get so far away from home? Mincy tells us that "Mincy just got in his car and didn't stop until he found himself in Oregon." Some of this year's coaching prospects who may have to do a bit of traveling before they settle down are Tom McCutchion, Paul Steiner, Wes Gile, and Al Van Wise.
FEATURED IN THE schedule will be a number of grudge matches against teams which weren't content just to win but had to embarrass us as well. Oberlin got away twice, 11-5 and 10-3; Kent won, 10-3; and Kenyon came out on top, 12-7. Ashland's 12-6 holocaust was the most disappointing defeat, but in Eagles' eyes it was a good game.
MUSKINGUM will be among the teams seeking revenge for last year's six victories. The Muskies got the short end of a tight 3-2 battle of the huskers when Keith Shearer did his usual moody job. The Muskies was downed by 10, 11-5, and 10-3. Wool, Joachim, and Martin were all picked up by a speedy six cuts, and Oberlin blew a 12-11 decision in the 9th after giving it a run in the 8th. This all foretells some exciting contests this spring, though who will tell from one game to the next whether they'll be close, well-played battles' hatters or else, loosely-played fumbles.
AL PYERS, laid low with a broken fibula, is expected to stop the Wooster bus, could be back on his feet sometime this spring, we're glad to learn, but won't be working full time until next fall when his leg will be completely healed.
AND SPEAKING OF legs, we'll be on our last one soon if we don't get our new blood to help us along. (We mean that last one on this page.) Those who want to become a sports writer may apply at the old, converted corn barn next to Soveil Hall between the hours of noon and 2 A.M. If you can't make it then, come some other time. We'll be glad to have you.
Visit our Gadget Bar for the unusual gift, including Sewing Kits, Kiss Timers, postcard holders for a small fee, $1.00 and up.
THE GIFT CORNER
S. E. CORNER OF PUBLIC SQUARE
THREE DELIGHTFUL FRAGRANCES!
THREE WONDERFUL COMBINATIONS!
Evening in Paris
"CARNIVAL OF VALUES"
REG. $1.50 VALUE
$1.00 EACH
2 FAMOUS PERFUMES
$1.50 value only $1.00
Evening in Paris, Endearing, Mols Oul—in handy purse kit.
3 REFRESHING COLOGNES
$1.50 value, each $1.00
Evening in Paris, Endearing, Mols Oul-in smart carry case.
All prices plus tax
BOURJOIS
FRANK WELLS DRUG STORE
WOOSTER, OHIO
Football Coaches Speak At Clinic
Last Saturday the Wooster College Athletic Boosters held their 1952 football coaches and fans in a second annual football clinic. The morning's afternoon sessions of the clinic were held in the cage, while the evening session was moved to Deacon.
After registration in the morning, Max Costa at Buckeye High School talked about the breakdown of the single wing. Mary English of Ohio Northern discussed the organization of a defensive line, and Jack Behlinger lectured on guards and tackles on offense.
After lunch the clinic resumed as Coach Thomas of Miami spoke about End Play, Jim Loughran from Cuyahoga Falls High School talked on the subject "Backfield Techniques of the T," Chuck Mather, coach of Massillon High School, gave two Lectures "Off-Season Duties of the
Baseball, Tennis, Golf And Track Will Open As Squads Get Back
All of Wooster's varsity spring sports squads will see action for the first time against other schools soon after vacation. The baseball team inaugurates the 1952 season by playing Ohio Wesleyan here April 17.
On Saturday, April 19 the golf team plays host to Kent State; two days later the tennis team travels to Cleveland for a match with Penn College. The first track meet is scheduled in Severance Stadium with Capital and Oberlin on April 26.
Coach Swigart's indoor men have been working hard to make up for time lost after working out in the gym for several weeks. Although the infield has not been in shape for infield practice, the men have engaged in some hitting practice.
Nine lettermen help make up the third nine men's team for the track team. The "mogram" winners are Keith Shearer and Tom McCutchion, pitmen; Eddie Malin and Randy Decker, catchers; and Kana Shorten, Bob Baub, third base; Billy Joachim and Bob Bush, outfielders; and Wes Gile, second baseman.
Coaches who have had considerable varsity experience are Carl Fleming, Al Pyers, and Dick Milligan. Among the newcomers are Bill Stoner, Bud Barra, Darrell Bush, Cliff Ellsworth, and Ed Becker.
Some thirty Wooster runners, jumpers, and throwers have made use of the moderately warm weather during the past two weeks in outdoor practice. The dash men have worked both on starts and speed, while longer distance runners have roamed the country roads of Wayne County. Coach Munson's track team had seven lettermen back from the first 1951 squad. George and Alton Allison (mile and half mile) and Bob Anderson (440 and mile relay) will defend an undefeated string against "foreign foes" in their first three meets.
Other track winners are: Jack Hayward, record-breaking weight thrower; John Keitt and Art Louth, hurdlers; Dick Mau, mile and half mile; and Bill Proctor, discus. Several others had varsity experience.
Among the freshmen are Jim Price and George Dunlap, dashers; George Bowers, broad jump and 440; Fred McKirchian, 80 run.
Coach Holt, with more than two of his regulars back to push the little white ball around the golf course. Dick Paige, top linksmen from last year's team, and Doug Augustine, from the veterans, will hope to lead the small team to another successful season.
The tennis team has gone through little organization, but the little ones and Mose Moore's protégés will have at least four among them who have had varsity experience. Pete Vosteen, Bob Askew, Dick Lengang, and John Farmer saw action last year.
Fifth Section Paces Volleyball Loop With Unbeaten Record In Six Games; Second, Sixth Tied As Runners-Up
As they entered their final game last night Fifth Section still led the Kenwood League in volleyball with an undefeated record. Following in the steps of last year's team, which also won the league with an undefeated record, the Fifth Section boys have already won six straight games while losing none.
Paced by Spider McCutchion, Jack Holt, Tom Gregg, John Farmer, Dick Milligan, and Dick Paige, Fifth has rolled over Fourth, Sixth, Third, Seventh, and Eighth with little trouble.
Following the leaders in the point scale are Sixth Section and Second Section, each with five victories and one defeat. Sixth has faced Fifth but has lost only to Fifth in a night contest. Second, however, has been beaten by Sixth and was not scheduled to play Fifth until last night.
In third place is Eighth Section with three wins and three defeats, followed by Seventh with two victories and four set-backs.
On Tuesday, March 25, action began in the Kenwood League double. First in three games by scores of 11-13, 15-4, and 15-4. Sixth came back after a first game defeat by Fourth to win the next two games without much trouble; the final score was 15-13 and 15-4. Fourth won the first, 15-9. In the final game of the evening Fifth continued its winning ways as it trounced First by 15-13, 15-13, and 15-13.
On Tuesday of this week the top three teams again won to keep the
(Continued on page four)
ATHLETIC DINNER
HUGE SUCCESS
Sixty athletes from all sports were honored last Friday evening at the Mid Summer athletic department banquet given at the Smithville Inn. Participating were all those various sports represented in some way with the Wooster athletic program.
The invocation, presented by Dean Young, was followed by the famous dinner, which consisted of a roast chicken dished up with noodles, biscuits, jam, butter, potatoes, dessert, candy, nuts, and topped off with "rumba."
Although no "big name" speakers were present, the banquet was considered a great success. Many of those present commented on the evening of merriment resulting from the humor and antics of the speakers.
More Hole, emcee master of the evening, introduced the speakers. President Emeritus Whisnant presented a historical account of the "Sororities and Fraternities." Prey were Dr. Williams, pastor of the First Presbyterian Church, representing the Board of Missions; Tom McCutcheon, captain of the '52 basketball team, spoke for the students; Dean Tuswuch represented the faculty; and Dr. Lowry expressed the feelings of the administration.
Coach Holt was honored by members of the "W" association in commemoration of his — birthday. Mose's gift may be seen either in his office chair or on the seat of his car (?).
DORMAIERS
SHOE REPAIR SHOP
Quality Repairing
215 East Liberty Street
THE SHACK
TRY OUR HOT FUDGE SUNDAES
EXECUTIVE CAREERS IN RETAILING
One-year Course leads to Master's Degree
• Prepare for a responsible executive position in retailing: buying, advertising, fashion, management, personnel, or teaching. Specialized training, exclusively for college graduates, covers all phases of store activity. Realistic approach under expert-trained faculty. Classes combined with supervised business experience with pay. Students usually placed before graduation. Co-educational. Master's degree. Next class begins July 1, 1952.
Write for Bulletin C
RESEARCH BUREAU FOR RETAIL TRAINING
UNIVERSITY OF PITTSBURGH • Pittsburgh 13, Pa.
Curses...
Handcuffed Villain Calls Police
... FOILED AGAIN
by Howard King
Anyone who ever accosts the faculty of this college of lacking a sense of humor will have to swallow their words after this week's performances of "Gold in the Hills." There are no adjectives to describe the audience's reaction to the antics of their supposedly tolerant professors as they gave their impressions of old fashioned American melodrama as it should be played.
Thinking that there was perhaps more to such a performance than met the eye, this reporter wandered backstage during Monday night's rehearsal to catch a glimpse of the "news behind the news." The first person I ran into (he nearly knocked me down a flight of stairs) was Mr. Barry Flagg, Richard Margotroyd-Handsome Harry Howard villain of the production. At first I thought he was practicing his swarthy villainous voice, especially since he was muttering "curse" under his breath, but then he told me his predicament with these handcuffs and cuffs," he said. "I've got them locked tight and can't get them off!" Investigation revealed the truth, however, that after a faithful three years' service the prop handcuffs had finally decided to serve the cause of the law, and so had attached themselves to the nearest villain and then refused to budge.
After a fruitless search for a non-working key or the student's cuffs, Professor William Craig called for the assistance of the men who use handcuffs most: the local constabulary. A sturdy sergeant soon arrived with a ring of handcuff keys, and the cast all began to breathe easier.
However, fate was not kind to Mr. Barry Flagg last night, for none of the keys would even fit into the lock of the handcuffs, much less open them. Realizing that the props were no longer made, the policeman suggested the only other alternative—he offered to call in the traitorous jailer and, from his prison cell, a nearby machinist who had the tools and skill necessary to saw the cuffs. He then led the dashing villain, complete with black cape, out to the police cruiser and off into the night.
Here the plot departs from its melodramatic ploy, for instead of being de-handcuffed by the saw, our hero-villain was set free without handcuffs. He was even returned to Taylor Hall in time to come flying down the aisle and on to the stage to take his lines.
The incident will not be forgotten, however, for the next day a reporter from the Daily Record investigated the matter, noting that the police blotter about making a call at Taylor Hall, then to a machinist's home, and finally to Taylor Hall and the police plot was spread throughout Wooster.
Volleyball
(Continued from page three)
Fifth night. Fifth started off by downing Eighth 15-8, 15-9, 15-10, then won by scores of 15-11 and 15-9. Sixth kept their hopes alive when they beat Third, also in four straight games. Sixth won the first, 15-10, then took the second by a 15-9.
In a close third and deciding game, Second came from behind to square the series, but probably lost the squad by a score of 17 to 15. Seventh had won the first, 15-16, and Seventh had taken the second game on a 15-8 score. In the deciding fourth, Fourth also came from behind in the third game to down First, 15-11. Fourth got off to a good start when they won the first game, 15-10, but slowed up in the second when they were defeated 15-3 by First.
KENARDEN LEAGUE STANDING
| Team | Won | Lost |
|------|-----|------|
| V | 4 | 2 |
| VI | 3 | 3 |
| VII | 3 | 3 |
| VIII | 3 | 3 |
| IX | 3 | 3 |
| X | 3 | 3 |
| XI | 3 | 3 |
| XII | 3 | 3 |
In Wooster It's Sally's
— FOR —
Easter Parade Fashions
We Have Your Easter Shoes
SEE OUR FINE SELECTIONS OF MANY STYLES OF FINE QUALITY SHOES TO FIT YOUR BUDGET
Your Favorite Store
For Men's and Women's Shoes
AMSTER SHOE STORE
"Famous for Fine Footwear"
WEST LIBERTY ST. WOOSTER, OHIO
Phaedrus philosophized:
You will soon break the bow if you keep it always stretched
Recipe for relaxation—take the contents of one frosty bottle of Coca-Cola. Delicious, too.
Dr. Schreiber Returns
(Continued from page one)
Dean of the College, Dean of Men, and one other faculty member were elected by the rest of the membership. This means a 6-5 majority for the students on the Committee.
Maxim Schmitzer remarked that a faculty chairman might be better qualified to advise on matters of style and good taste, while Arwell pointed out that a student chairman could represent the VOICE on make-up night, on behalf of the Committee. President Sperry reminded the Senate, however, that the Committee as a whole is to perform these duties.
Another factor suggested by Don Harrington was that faculty chairmen and students have a majority vote. Paul Clark finally suggested the possibility of election from among the members of the "Committee itself. Thus the chairman might be either student or faculty, and might vary from year to year. No final action was taken on the matter.
A recommendation that the new Student Senate be review and emuliate the preferential ballot system used in presidential elections was approved by the Assembly and passed unanimously by the Senate. The action followed a report by Margaret Beekel, appointed by the Senate to investigate student complaints about the preferential ballot which was used in the last election. She explained that there has been a great deal of confusion due to a lack of understanding of how the votes were tabulated.
President Sperry appointed Harrington and Sara Jane Little NSA chairmen, George Kuzmishin the treasurer, and George Kuzmishin to investigate the worth of WCW.
WSWF Thanks College
A fifty-dollar gift from the student body faculty of the college has been acknowledged by the Student Staff Service Fund. The fund is organized to help meet the needs of European and Asiatic students.
Senate
(Continued from page one)
others to confuse his listeners. One student remarked: "You look and act like an American, but you talk like a German. Which are you?"
The answer could well be "both." Prof. Schreiber was born in Berlin, which he revisited during January and February of this year, and he had completed some of his secondary education before emigrating in 1923 to this country, where he obtained his doctorate. His last trip to Germany was in 1937.
One of the most startling aspects of his lecture experiences was the physical reactions of the audience. The war left crust and painful marks. Many were without arms or legs.
Sure! It's Your Money!
BUT WHY PAY MORE THAN AN ARTICLE IS WORTH?
When you buy from salesmen in your home, who do not represent a business with a permanent retail establishment in your own town or locality, you PAY too much.
Selling in the home is a very expensive form of merchandising and the consumer PAYS the bill.
Always buy silver and other jewelry, china and glassware in a fine jewelry store in any town and save money.
There are many other advantages in dealing with a fine store. We'll be glad to explain them.
STERLING - SILVER - WATCHES - DIAMONDS
CHINA - GLASSWARE
Jacket $5.98
Bra $1.98
SHORTS $2.98
SUN SHINERS SMART DENIM
To Mix — Match — Mate thru summer. The smartest, most practical day and play denims we have seen. Sizes 10 - 18. Colors — Pink, Aqua, Brown
FREEDLANDER'S
|
<urn:uuid:31948226-8fc5-4545-9223-c577a8a7e2b5>
|
CC-MAIN-2019-04
|
https://openworks.wooster.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=1027&context=voice1951-1960
|
2019-01-24T10:40:34Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584520525.90/warc/CC-MAIN-20190124100934-20190124122934-00175.warc.gz
| 578,113,260
| 9,402
|
eng_Latn
|
eng_Latn
| 0.990616
|
eng_Latn
| 0.999018
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
662,
11642,
23829,
34938,
42270
] |
Enchanted Lens Camera Club
Exhibition Rules
EXHIBITION RULES
Who Can Enter Into the Exhibitions?
ELCC members in good standing with dues paid in full.
How to Enter
ELCC Exhibition Entries will be made using the online submittal form located in the Member's area of the ELCC Home Page and (eventually) linked to the Exhibition Home Page. Prints and digital projected images may be either color or black and white. Use the entry form to upload your images for the monthly ELCC Exhibitions. You must submit your online image(s) the day after each Exhibition (usually Friday) up until 10:00 pm, two days before the next Speaker's Meeting. An example of instructions and Online Entry Form are below;
This form works for both digital entries as well as a digital image of your print entry.
Use this form to upload your images for the monthly ELCC Exhibitions. You may enter one image in the digital category, and one print in each monthly Exhibition.
- You no longer need to rename your file; the form will do it for you. Therefore, when entering the Title of your image;
o Enter only the Title. DO NOT Include your Group (AA, A, or B) or whether it's Assigned or Open in your Title. Use characters only — no apostrophes, exclamation points, question marks, quotations, periods, underscores or other symbols.
- Digital images shall be JPEG, and should be at least 2048 pixels on the longest side and 1536 pixels on the shortest side. Recommended image size is about 2 mb. Maximum size is 8 mb.
- Check that all fields have been completed before you hit the "upload your image" button
- Wait 20-30 seconds for your image to upload before leaving the web page.
- Your Print must be brought to the Exhibition booth by 7:30 pm at the first meeting of the month. The back of the Print must be marked - for example; A-Open-Red and Green
What to Enter
Each member may enter up to two images each month. The two images shall consist of no more than one digital image and one print. There are no requirements or restrictions on entering in the Open or Assigned categories.
Divisions and Categories
A Division is the Group you belong to for the purpose of Exhibition judging;
- B Group - New Members, novices, and intermediates;
- A Group - Generally advanced amateurs and experienced photographers; or
- AA Group - Expert photographers.
A Category is the set of images that each month is defined as Assigned or Open.
Images are entered as follows:
| | MEDIA | | DIVISION (Group) | | | | CATEGORY |
|---|---|---|---|---|---|---|---|
| Digital | | B Group | | A Group | AA Group | Assigned | |
| Prints | | B Group | | A Group | AA Group | Assigned | |
A list of the current years assigned categories is located on the main page of the club website (www.enchantedlens.org) and at the bottom of the Exhibition page.
DETERMINATION OF GROUP
NEW MEMBERS
New members should evaluate their skills before they enter their first image in the club's Exhibition. The Exhibition Chair or other club members can help you determine the most appropriate group for you to be in. New and less experienced members and those who have not entered many images into Competitions or Exhibitions usually enter in the "B" Group. A new member who wishes to begin in the A or AA Group must notify the Exhibition Chair in writing (email is acceptable) at or before their first entry of a Club year.
EXISTING MEMBERS
Any existing Group member may advance to the next higher group by notifying the Exhibition Chair in writing at or before his or her first entry of a new Club year. Members may not advance in their Group after they have entered an image during a club year. Once a member has moved to a higher Group s/he can only move back by making a written request to the Executive Committee and receiving written approval.
ADVANCEMENT
Members who have submitted eight or more images and whose overall ribbon-merit-point average is in the top 20 percent of the B and A Groups (based on the number and type of ribbons their images received at the monthly exhibitions) will be promoted to the next higher Group in the following club year as well as recognized at the end of year for their accomplishment.
There will be Exhibitions for both Projected Digital and Prints in the following ten Divisions/Categories:
REQUIREMENTS OF ENTRIES
Monthly Exhibitions: Digital images must not show the makers name when they are projected. You are not required to delete your name from the metadata including the copyright information. Watermarks are not allowed whether that is the maker's name or copyright notice.
End of Year Awards: Each image entered in the Picture of the Year Exhibition must have been entered in one of the monthly Exhibitions of that Club year, and each must be the same physical entry submitted in the monthly Exhibition (that is, the same unaltered digital image or print including matting), and must have exact same title. It may be from either the Assigned or the Open category.
PRESENTATION OF ENTRIES
The images and monthly Exhibition results will be presented at the second meeting (normally the third Thursday of the month). The results will be announced, and then each image will be briefly critiqued by the judge. In the event of cancellation of the live presentation because of a power failure or equipment failure, for example, complete results on the ELCC Exhibition Home Page. To preclude any disruption to the following month's Exhibition process, the live presentation will not normally be rescheduled. If, for reasons beyond the entrant's control, a properly submitted photograph is not judged, it will typically be judged in the following month's Exhibition as an Open entry.
RE-ENTRY OF IMAGES
Images that have been awarded 1st, 2nd, 3rd and/or Honorable Mention during an ELCC Monthly Exhibition or End of Year "Picture of the Year" Award may never be re-entered into a Monthly Exhibition.
Images that have never been awarded 1st, 2nd, 3rd and/or Honorable Mention during an ELCC Monthly Exhibition or End of Year "Picture of the Year" may be re-entered into the monthly Exhibition and End of Year "Picture of the Year" one time.
Images that are re-entered must have the same image title as the original entry.
WHEN TO SUBMIT PRINT ENTRIES
Entries to the monthly Exhibitions are now through an online submittal process. You must submit your online image(s) the day after each Exhibition (usually Friday) up until 10:00 pm, two days before the next Speaker's Meeting.
Prints will be accepted at the first regular meeting of each Club month if the member has properly submitted the image to the online entry process.
Digital copies of prints are required for monthly print entries to be exhibited. They shall be provided with other digital images as part of the online submittal process.
PRESENTATION OF PRINTS
- Prints may be printed either commercially or by the maker.
- Print size must be between 8"x10" and 16"x 20".
- Prints must be mounted on rigid board or matted with appropriate backing.
- The minimum dimension of the board or mat will be 10"x12".
- The maximum board or mat size will be 20"x 24".
IDENTIFICATION OF PRINTS
The file name (Group-Category-Image Title) must printed (a label is acceptable) in the upper lefthand corner of the back of the mount board.
The name of the submitter must NOT appear on the label that displays the print title, or on the mat, or on the face of the print.
RETURN OF ENTRIES
Prints should be taken home immediately after the Exhibition has ended. Prints not removed will be stored in the storage room at the Exhibition Hall. Images remain the property of the photographer. Neither the Club nor its Officers will be held responsible for lost or damaged Prints.
JUDGING
Judging of the monthly Exhibition entries will be accomplished between the first and second club meeting each month. Judging will be done by highly qualified photographers. Highly qualified photographers who are also members of the ELCC may be selected as judges. However, judges who are members of the ELCC must be approved by the Exhibition Committee Chair. As a general rule, the Exhibition Committee Chair will only accept member judges who are not currently active participants in the Exhibition and for whom there is no perception of bias. Member judges may not enter their own images into the Exhibition for which they are judging. For the exception to this rule, please see below.
Judges will be directed to critique each print and projected digital image, based on their judgment of the photographs with regard to originality, creativity, composition, technical quality, and impact. The judges will be asked to make their judgments without being unduly influenced by titles or by the mounting and matting of the prints.
The judge may, at their discretion, select the first, second, and third place entrants (as well as ties) and up to 3 Honorable Mention awards in each of the Exhibition divisions and categories.
While the main value is his/her educational critique, images are also scored by the judge, who awards 1st, 2nd and 3rd places and Honorable Mentions in each of the Groups (Divisions B, A and AA) and Categories. Images are scored using merit points for ribbons awarded; 100 points for 1st place, 70 points for 2nd place, 40 points for 3rd place, and 20 points for Honorable Mention.
Judges may not change the category of images. The judge should include in their critique why they believe an image was not correctly categorized, and this may have impact on their scoring of an image. When a judge who can meet the criteria above is not available, a panel of four ELCC members will be appointed by the Exhibition Chairperson.
Three will be named as judges and one as an alternate. During a separate meeting, the panel will judge all entries as described above. Each panel member will identify their choice of ribbon winners from all entries including his or her own, but without disclosing to the other panel members which are his/her entries. For each entry, one of the four panelists' results will be discarded. When the entry is the work of one of the panelists, his/her results will be the one discarded. If the entry is not one of the panelists' entries, the alternate's results will be discarded. The judges must come to a consensus when awarding ribbons, as the judging panel does for the End of Year Picture of the Year Awards.
END OF YEAR AWARDS
Members who have the highest average based on their ribbon-merit-point average (of images during monthly Exhibitions) win the Photographer of the Year Awards. These awards are given for both "Assigned" and "Open" categories to entrants who have entered at least 6 images in the respective categories. Photographer of the Year awards are given out for members who finish in the top 3 of each respective award category
Picture of the Year Awards are given to the First place winners in each Division (Digital and Prints), as described in the Exhibition Rules. These awards are given to each Group (AA, A, and B). In addition, an "Overall Picture of the Year" is awarded to the member whose image is selected by the End of Year judging team to be the best of the images that received 1 st , 2 nd , and 3rd Place awards.
For the Picture of the Year Awards, each member may enter up to three images in a Division (Digital, Prints) for a total of four images. The images will be submitted before or at the last regular meeting of the year and each must have been entered in one of the monthly Exhibitions of that Club year, though they need not have placed in that Exhibition.
Promotion to the Next Highest Group: Promotion to the Next Highest Group: Persons who have submitted eight or more images and whose overall ribbon-merit-point average is in the top 20 percent of the B and A Groups (based on the number and type of ribbons their images received at the monthly exhibitions) will be promoted to the next higher Group in the following club year as well as recognized at the end of the year for their accomplishment. NOTE: Persons in the top 20 percent who are in the AA group will be recognized without being promoted, as the AA group is the highest level group in the club.
INTERPRETATION OF RULES
The Exhibition Committee is responsible for interpreting and carrying out these rules. If a decision is disputed, a member may petition the Executive Board. Petitions must be in writing.
AMENDMENTS AND CHANGES
These Exhibition Rules may be changed as noted in the ELCC Bylaws Article IV; paragraph 3, "Duties of Committees."
Exhibition rules changes that, in the opinion of the Exhibition Chair, do not affect the substance or intent of the Exhibitions process may be made without completing the requirements as stated in the previous paragraph.
Members wishing to comment on pending changes should send an email to [email protected].
--------
|
<urn:uuid:30f6ae89-1895-468a-a36b-0085415306e4>
|
CC-MAIN-2017-26
|
http://enchantedlens.org/comp_410_629840435.pdf
|
2017-06-25T20:43:32Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00555.warc.gz
| 125,366,630
| 2,815
|
eng_Latn
|
eng_Latn
| 0.99833
|
eng_Latn
| 0.998541
|
[
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
44,
1843,
3838,
6272,
8486,
11665,
12962
] |
Łódzkie Towarzystwo Fotograficzne zaprasza wszystkich fotografujących do udziału w międzynarodowej wystawie
pt. „Kolor w kwadracie"
Cel: wystawa ma pokazać aktualny stan fotografii artystycznej.
Regulamin:
1. Uczestnikiem wystawy może być osoba, która ukończyła 12 lat.
2. Uczestnik może wysłać tylko jedno kolorowe zdjęcie w postaci pliku JPG przygotowanego do formatu:
30x30cm w rozdzielczości 300 DPI. Musi ono nawiązywać do tematu wystawy, czyli – zdjęcie kolorowe w stosunku
boków 1:1.
3. Zdjęcia które będą rażąco niskiej jakości lub naruszały polskie prawo nie zostaną dopuszczone do wystawy a wpłata zostanie wówczas zwrócona do nadawcy.
4. Plik należy opisać wg wzoru zamieszczonego poniżej (bez polskich znaków):
imię_nazwisko_rok wykonania zdjęcia przykład: jan_kowalski_2016.jpg
5. Technika wykonania zdjęcia – dowolna; dopuszcza się fotomontaże.
6. Termin dostarczenia pliku: 1 sierpnia 2017 do godz. 23:59
7. Pliki można wysyłać na adres e-mail: [email protected] lub dostarczyć osobiście do siedziby Łódzkiego Towarzystwa Fotograficznego.
Dodatkowo do pliku należy dołączyć plik tekstowy z danymi: imię i nazwisko, wiek uczestnika, rok wykonania zdjęcia, miejsce zamieszkania, kontakt (adres e-mail, nr telefonu, adres zamieszkania), krótki opis techniki wykonania zdjęcia oraz informację, iż jest się jego autorem.
8. Koszt uczestnictwa – 35 PLN, członkowie ŁTF – 25 PLN; dla osób spoza obszaru Polski – 8 EUR.
Opłata uwzględnia: koszty administracyjne oraz katalog wystawy w wersji cyfrowej PDF.
Zdjęcia nadesłane bez potwierdzonej wpłaty nie wezmą udziału w wystawie.
9. Miejsce wystawy: Galeria Fotografii ŁTF im. Eugeniusza Hanemana – Łódź, ul. Piotrkowska 102.
10. Wpłaty można dokonać w siedzibie Łódzkiego Towarzystwa Fotograficznego – Łódź, ul. Piotrkowska 102 lub przelewem na konto ŁTF – nr konta: PKO BP 13 1020 3352 0000 1202 0074 2676 kod
SWIFT banku: BPKOPLPW z dopiskiem „Kolor w kwadracie".
11. Wszystkie zakwalifikowane zdjęcia na wystawę pozostaną w archiwum ŁTF z zachowaniem wszelkich praw autorskich twórcy zdjęcia.
12. Organizator zastrzega sobie prawo do wykorzystania nadesłanych zdjęć do promocji wystawy w mediach i portalach społecznościowych.
13. Uczestnicy niespełniający powyższych punktów nie wezmą udziału w wystawie.
14. Przesłanie zdjęć na wystawę jest jednoznaczne z akceptacją przez uczestnika regulaminu wystawy.
Termin wystawy: sierpień 2017
Association of Photographers in Lodz (LTF) invites all photographers to participate in the international exhibition "Color in the square"
Objective: The exhibition aims to show the current condition of fine-art photography.
Regulations:
1. Participants must be at least 12 years old.
2. A participant may send in only one color photo as a JPG file prepared for the 30x30cm format in the resolution of 300 DPI. It must be consistent with the exhibition subject, i.e. it must be color photo with 1:1 aspect ratio.
3. Photos of remarkably poor quality or violating the Polish law will not be admitted; in such a case, the payment will be returned to the sender.
4. The file must be named according to the following convention:
first name_last name_year shooting
Example: john_smith_2016.jpg
5. The photographic technique - whatsoever; photomontage is allowed.
6. The deadline for sending in the file: August 1st, 2017, at 11:59 p.m.
7. The file can be sent by e-mail: [email protected], or delivered in person to the headquarters of the Association of Photographers in Lodz, Poland.
In addition, the file must be accompanied by a text file with the following data: full name and age of the participant, the year the picture was taken, place of residence, contact information (email address, phone number), a brief description of the photographic technique, and the statement of authorship.
8. Participation fee - 35 PLN; Members of LTF - 25 PLN for persons outside of Poland - 8 EUR. The charge includes photo printing, administrative costs and the exhibition catalog in the digital form (PDF and ePUB). Photos submitted without the payment confirmation will not take part in the exhibition.
9. Venue: Eugeniusz Haneman LTF Gallery of Photography - ul. Piotrkowska 102, Lodz, Poland.
10. Payments can be made at the headquarters of the Association of Photographers in Lodz,
ul. Piotrkowska 102, Lodz, Poland, or by wire transfer to the LTF account: bank name: PKO BP, account No.:
13 1020 3352 0000 1202 0074 2676, SWIFT code: BPKOPLPW, with an annotation: " Color in the square"
11. All valid exhibition photographs will remain in the LTF archive, the authors' copyright being protected.
12. The organizer reserves the right to use the submitted photos for the promotion of the exhibition in the media and social networks.
13. Participants not fulfilling the above criteria will not take part in the exhibition.
14. Sending in photos for the exhibition is tantamount to acceptance of the exhibition regulations by the participant.
The exhibition date: August 2017
|
<urn:uuid:0e9ff268-a27b-47b1-b631-1230457ac728>
|
CC-MAIN-2017-34
|
http://ltf.com.pl/images/regulamin-kolor.pdf
|
2017-08-24T08:34:37Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886133447.78/warc/CC-MAIN-20170824082227-20170824102227-00668.warc.gz
| 261,838,811
| 1,491
|
eng_Latn
|
pol_Latn
| 0.500035
|
pol_Latn
| 0.987814
|
[
"pol_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2412,
4983
] |
| Nominal Size | Outer Diameter | G-18 (1.0mm) | G-18 (1.2mm) | G-16 (1.6mm) |
|--------------|----------------|--------------|--------------|--------------|
| mm | inch | mm | Kg/m | Kg/6m | mm | Kg/m | Kg/6m | mm | Kg/m | Kg/6m |
| 12 | ½" | 12.7 | 0.289 | 1.734 | 0.340 | 2.040 | 0.438 | 2.628 |
| 16 | 5/8" | 15.9 | 0.368 | 2.208 | 0.435 | 2.610 | 0.564 | 3.384 |
| 19 | ¾" | 19.1 | 0.447 | 2.682 | 0.530 | 3.180 | 0.691 | 4.146 |
| 22 | 7/8" | 22.2 | 0.523 | 3.138 | 0.622 | 3.732 | 0.813 | 4.878 |
| 25 | 1" | 25.4 | 0.602 | 3.612 | 0.716 | 4.296 | 0.939 | 5.634 |
| 28 | 1⅛" | 28.6 | 0.681 | 4.086 | 0.811 | 4.866 | 1.066 | 6.396 |
| 32 | 1¼" | 31.8 | 0.760 | 4.560 | 0.906 | 5.436 | 1.192 | 7.152 |
| 35 | 1⅜" | 34.9 | -- | -- | 1.000 | 6.000 | 1.318 | 7.908 |
| 38 | 1½" | 38.1 | -- | -- | 1.092 | 6.552 | 1.440 | 8.640 |
| 41 | 1⅝" | 41.3 | -- | -- | 1.187 | 7.122 | 1.567 | 9.402 |
| 44 | 1¾" | 44.5 | -- | -- | 1.281 | 7.686 | 1.693 | 10.158 |
| 47 | 1⅞" | 47.6 | -- | -- | 1.373 | 8.238 | 1.815 | 10.890 |
| 50 | 2" | 50.8 | -- | -- | 1.468 | 8.808 | 1.942 | 11.652 |
| 54 | 2⅛" | 54.0 | -- | -- | 1.563 | 9.378 | 2.068 | 12.408 |
| 57 | 2¼" | 57.2 | -- | -- | -- | -- | 2.194 | 13.164 |
| 60 | 2⅜" | 60.3 | -- | -- | -- | -- | 2.316 | 13.896 |
| 65 | 2½" | 63.5 | -- | -- | -- | -- | 2.443 | 14.658 |
| 80 | 3" | 76.2 | -- | -- | -- | -- | 2.944 | 17.664 |
Available in Cold Rolled, Hot Rolled Material.
Specification :- JIS G - 3445 - 1983 - STKM 11A
|
<urn:uuid:b72f171e-8120-4605-81bd-cac30ae61342>
|
CC-MAIN-2024-33
|
http://www.hockcheong.asia/wp-content/uploads/2016/07/Furniture-Tube-watermark.pdf
|
2024-08-15T12:16:50+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-33/subset=warc/part-00093-4f628544-3cdf-4526-86aa-bdfa0b33cdc9.c000.gz.parquet
| 41,555,822
| 991
|
eng_Latn
|
eng_Latn
| 0.424753
|
eng_Latn
| 0.424753
|
[
"eng_Latn"
] | false
|
docling
|
[
2918
] |
UNITED STATES BANKRUPTCY COURT MIDDLE DISTRICT OF FLORIDA TAMPA DIVISION
IN RE:
CHARLES F. STEINBERGER
PAMELA J. PERRY
Case No. 8:10-bk-19945-KRM
Debtors
Chapter 7
- - - - - - - - - - - - - - - -
DENISE SUBRAMANIAM,
Plaintiff,
v.
Adv. Case 8:11-ap-00418-KRM
CHARLES F. STEINBERGER, ICANN, INTERNET.BS CORP., and SUSAN K. WOODARD, trustee,
Defendants
__________________________________/
ORDER GRANTING DEBTOR'S MOTION TO DISMISS ADVERSARY ACTION AGAINST THE DEBTOR WITH PREJUDICE
THIS CASE came upon the Debtor's Motion to Dismiss Adversary Action against Debtor (the "Motion") (Doc. No 17), heard before this Court on June 21, 2011. The Debtor Charles Steinberger was present through counsel. The Creditor was not present. The Court, upon considering the Motion, determined that the Motion should be granted. Accordingly, it is
ORDERED:
1. The Motion is GRANTED.
2. This adversary action against the Debtor Charles F. Steinberger is DISMISSED WITH PREJUDICE.
DONE
and
ORDERED
in Chambers at Tampa, Florida, on __________________________.
June 24, 2011
_____________________________
K. Rodney May United States Bankruptcy Judge
Copy furnished to: Copies to be provided by CM/ECF service.
1
|
<urn:uuid:173342e4-718c-4d99-96b5-7b744bb3111d>
|
CC-MAIN-2022-27
|
https://www.icann.org/en/system/files/files/motion-to-dismiss-steinberger-24jun11-en.pdf
|
2022-06-29T15:48:09+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-27/subset=warc/part-00273-48f675b2-7fd4-43af-adb3-2a4ea7f82193.c000.gz.parquet
| 866,752,197
| 365
|
eng_Latn
|
eng_Latn
| 0.95584
|
eng_Latn
| 0.95584
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
1233
] |
balance between specialist studies and work that introduces these sorts of doctrines to the scholarly public in general—for example, to scholars interested in the history of the sciences. The borders between magic, science, and religion were much more blurred in antiquity than they are today, so this journal could be very useful for those interested in any of those interrelated spheres.
Pablo A. Torijano
Clive Ruggles, *Astronomy in Prehistoric Britain and Ireland*. x + 285 pp., illus., figs., tables, apps., bibl., index. New Haven, Conn.: Yale University Press, 1999. $65.
Archaeoastronomy, in essence, deals with the links between prehistoric peoples and astronomy. Over the past thirty years, this apparently simple and singular discipline has been addressed by researchers from a broad spectrum of fields, and their results have often been presented outside mainstream archaeological journals. Clive Ruggles notes that this has produced a communication divergence with mainstream archaeological researchers, which, he argues, has resulted in their lack of interest in and skepticism of the field. To a large degree, Ruggles’s book aims to redress this communications gap, which has been exacerbated by the level of statistical analysis inherent in archaeoastronomy. The resulting book is not so much on the *topic* of “prehistoric astronomy of Britain and Ireland” as on its *study*.
This is very much a reference volume, and it works very well at that level. Its chapter-by-chapter approach, and the detailed adjunct boxes spread throughout the book, allow it to function effectively as a student text. However, it works less well for a more general reader, who must spend time “to-ing and fro-ing” between boxes, endnotes, and texts. Absorbing many of the endnotes within the body of the text or into footnotes would have added elegance to this discursive and tightly woven reference work. Overall, the background boxes are useful and informative, although on occasion the nonspecialist will be left needing more explanation.
The book begins with an enjoyable, if disheartened, introduction. It then moves on to discuss the contributions of early giants in the field, Alexander Thom and his grandson. Their work is subject to tightly constructed critical analysis, which shows us that solar and lunar alignments accurate to within a small number of minutes of declination are not supported, while those of less accuracy (focusing on solstitial or lunar stand-still limits) are significant. The concept of general social context, discussed in Chapter 4, makes for an attractive topic in itself. There is some concern regarding the very general nature of the archaeological background given, in relation to animal husbandry and cultivation. The nonspecialist might take the idea of “organised activity” in forest clearing, grain cultivation, and herding as an intensive and extensive farming phenomenon in the Neolithic, even though that is clearly not stated. Having said this, Archaeology Box 4, on monuments, is quite a good
*Newgrange, Co. Meath, Newgrange passage tomb, as reconstructed, viewed from the south-east (from Clive, Astronomy in Prehistoric Britain and Ireland).*
overview, capturing the associated myriad threads of the ongoing social developments in Britain and Ireland.
The topics of orientation and astronomy in stone circles and short stone rows, considered in Chapters 5 and 6, are engaging, although some ideas advocated here did not seem to be explicitly supported. Why is it uncomfortable to have “the idea of pre-planning over several years” in order for the builders of the recumbent stone circles to note the annual changes in the moon’s motions? Such behavior, if supported, might denote its importance or “specialness.”
Context, in terms of the landscape and the skyscape that surround archaeoastronomical sites, must be understood from the perspective of those who constructed ancient monuments. Addressed in Chapter 7, this topic makes most welcome reading. However, Chapters 7 and 8 highlight an urgent requirement for tying the archaeoastronomical data in with local archaeological interpretation in order to add specific social context.
The latter parts of the book aim to “examine some of the wider issues and look to the future.” However, these goals have already been largely achieved in the text at this stage, and any new points introduced here, such as those made on pages 154–155 and the discussion of equinoctial alignments, would have been better woven into previous chapters. The section “Beyond the Green and the Brown,” which discusses methodological possibilities for an encompassing and appropriate approach to archaeoastronomy, is rather out of place immediately before the closing of the work. The data provided by Ruggles in the appended reference lists will be very useful for firsthand examination and for any new research done by readers of this volume.
Many archaeologists, particularly the younger ones, today acknowledge the importance and relevance of archaeoastronomy. Ruggles’s investigative and reflective work will provide a thought-provoking summary of the field for them, for workers already contributing to the field, and for the more general student.
GAIL HIGGINBOTTOM
Liba Taub. *Ancient Meteorology*. (Sciences of Antiquity.) xiv + 271 pp., illus., bibl., index. London/New York: Routledge/Taylor & Francis Group, 2003. $28.95 (paper).
Liba Taub’s *Ancient Meteorology* is a much-needed survey of this field; the last general book on this topic was published in 1907 and the last one in English even earlier, if one does indeed exist. The lack of scholarly attention to this field is not indicative of its historical importance. As this book skillfully shows, meteorology, in one form or another, formed a part of the teaching and research of leading philosophical schools, such as those of the Peripatetics, Epicureans, and Stoics, was prominent in almanacs and municipal displays, and was present in a number of examples of didactic literature. While past commentators on this field have deemed ancient meteorology to be conservative and tradition bound, this book shows that the repeated attempts to give naturalistic accounts of meteorological phenomena were crucial to the desire to understand the relation between the earth and the cosmos as a whole.
This book will be of interest to specialists and is also accessible to those with only a limited knowledge of ancient science. The emphasis on genre, observational traditions, and philosophical explanation might be appropriate for introducing students to many important themes and ideas of the history of ancient science; and while specialists might not need to be reminded that didactic poetry was a common means of spreading philosophical knowledge in antiquity or that Aristotle used four kinds of causes to explain natural phenomena, they might do well to be reacquainted with less familiar texts, such as the works of Postumius Rufius Festus Avienus and the pseudo-Aristotelian *De mundo*.
This is not to say that the contents of this book are obscure. Taub shows that meteorology in antiquity, like meteorology today, was linked, and at times central, to key understandings of the earth and nature in general. Taub accurately divides ancient meteorology into two fields: the first attempted to predict the weather and the second was dedicated to explaining changes in the sublunary realm. The second field includes topics beyond atmospheric variations, including those concerning what we today would label seismic and hydrologic phenomena. For the science of prediction, Taub shows the use of observation and tradition evidenced in astro-meteorological texts and artifacts, thereby demonstrating meteorology’s relation to astronomy as well as its application to practical fields, such as agriculture, that relied on the accurate interpretation of weather signs. Major writings, including those by Hesiod, Ptolemy, Geminus, and Aratus, figure prominently in this discussion. While Taub’s attempt to describe these authors as participants in a diachronic community may not be fully convincing, the stress on the role of passing down and appropriating observations
In Ireland the centre of prehistoric civilisation grew around the River Boyne and at Tara in Ulster. The importance of these places in folk memory far outlasted the builders of the monuments. After 2400 bc new groups of people arrived in southeast Britain from Europe. View Prehistoric Astronomy Research Papers on Academia.edu for free. According to reported data, the basis of astronomical knowledge and related cosmological ideas was shaped at the end of Neolithic-Eneolithic by a tripartite model of the world in its horizontal and vertical projections. Leading forms of worship by local cults are concomitant with collective sacrifices closely connected with calendar ceremonialism. A History of Ancient Britain book. Read 97 reviews from the world's largest community for readers. Who were the first Britons, and what sort of world did Rua Lupa. Ancient Music and Instruments of Ireland and Britain: The story of a distinctive musical culture during the Stone Age, Bronze Age and Iron Ages off North Western Europe. Harmonic flutes, horns, great Celtic trumpets. Music archaeology in performance, parade, legend, healing, fanfare and war. Ireland in Prehistory - A concise account. Prehistoric Ireland - Great passage mounds, dolmens, stone circles, standing stones, alignments are all an important feature of the landscape. Rua Lupa. Astronomy in prehistoric Britain and Ireland. xi+286 pages, b&w figures, 18 tables. 1999. New Haven (CT) & London: Yale University Press; 0-300-07814-5; hardback $65 & £45. John Barnatt (a1). Prehistory stretches from then until the Roman invasion in AD 43. In the hundreds of thousands of years before history began, these lands underwent huge climactic, societal, political, technological and geological changes. Along with artefacts discovered by archaeologists, the henges, hillforts and burial sites still visible in the landscape today can give us with fascinating glimpses into the lives of the people of prehistoric England. Ages and Ages. Power in prehistoric Britain was expressed symbolically, through the likes of mighty communal monuments, rich grave goods, and massive hillforts. Prehistory: Religion.
|
<urn:uuid:603f5adb-ab5d-431c-ab6c-a015b82eba2b>
|
CC-MAIN-2021-43
|
https://unru.pw/531685_file.pdf
|
2021-10-22T00:59:35+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00006-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 725,897,955
| 2,118
|
eng_Latn
|
eng_Latn
| 0.995495
|
eng_Latn
| 0.997193
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
3196,
8220,
10378
] |
CIRCULAR
In view of the annual event Anugoonj which is being organized from 17.02.2020 to 19.02.2020, all the faculty members have to ensure their presence during various events so as to have better management.
This issues with the approval of the Vice Chancellor.
(Ravi Dadhich)
Registrar
Copy to:
1. All Deans / Directors, GGSIPU
2. AR to VC, GGSIPU – for kind information of the Vice Chancellor
3. Head, UITS – for uploading the same on the University’s website
|
<urn:uuid:5adb2cf9-f173-44b5-8b7b-1c1ecb983673>
|
CC-MAIN-2020-16
|
http://ipu.ac.in/Pubinfo2020/nt30130220.pdf
|
2020-03-29T22:21:52+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-16/subset=warc/part-00202-5e0433ee-fa15-4837-b2dc-d6f38301af97.c000.gz.parquet
| 91,426,066
| 124
|
eng_Latn
|
eng_Latn
| 0.98169
|
eng_Latn
| 0.98169
|
[
"eng_Latn"
] | false
|
docling
|
[
469
] |
Duncan Craig LLP
Shareholders Disputes do not have to be "Autopsy" Litigation – You have Options
Author : Edward Feehan
Over the years we have represented quite a number of business owner-managers in shareholders disputes. Prevention is often worth a pound of cure, but what do you do when things have already gone off the rails?
The first thing to recognize is that commercial disputes are what we call "real-time litigation," as opposed to autopsy litigation. For example, in a personal injury claim, an accident results in an injury that requires compensation. The litigation focuses on the facts that caused the accident. Those facts dictate liability and a further set of facts about the injuries and their impact dictate the amount of damages. The facts in these types of cases are set, there's no changing them, and legal battles are fought over whether there is sufficient evidence to support these facts.
Commercial litigation is a different animal. Commercial disputes are "real time" in the sense that there is an opportunity to change the facts on an ongoing basis and thereby change the outcome of your case.
Changing the Facts in Shareholder's Disputes
As an example, say you are fighting with another shareholder and the business is verging on insolvency. In this scenario, you can apply to put in a trustee, an inspector, a monitor or a receiver. This action changes the facts relevant to the business and your position in the dispute. Alternatively, you may have the resources to buy the position of one of the secured creditors that otherwise has nothing to do with your fight. If you go that route, you transform your position into that of a secured creditor. In short, you have opportunities to change the facts related to your position in that dispute and that change affects the ultimate outcome.
Another common scenario arises if a shareholder is also a senior or key employee in the business and there is a parting of the ways. If your employment is terminated, your post-termination fiduciary obligations to the company are far less than if you resign, which may grant you the option to set up in competition with your former corporation. If you are a key employee who was instrumental in the success of the business, this may well be an attractive option that you can leverage in buy-out negotiations. Even if you resign, that option may still be open, subject to any contractual obligations, e.g., non-solicitation or non-compete clauses in your employment contract and posttermination fiduciary obligations.
The situation will be different if you also wear a director's hat because directors do have fiduciary obligations to the company. The point is that you may change your position from seeking notice or
Powered by TCPDF (www.tcpdf.org)
compensation from the company to one where you are now a competitor and have a better bargaining position.
Another example might be where you are both a shareholder and the landlord of the premises where the company operates. One option that may be open to you is to terminate the lease and use that as leverage to get what you want in negotiations. The point being that in commercial litigation you can very easily change the factual matrix within which a dispute is operating, and that changes the tools at your disposal to leverage your position.
To help you review your options and strategies, talk to a commercial litigator with a wide range of experience. Our Commercial Litigation group has been working with Edmonton business owners for over a century and while every situation is unique, we have developed experience in just about every type of dispute that arises. This means we can help you identify the opportunities and the pitfalls. Contact us today to find out what your options are.
Ted Feehan
|
<urn:uuid:b31e0659-7177-46e9-b381-fc9dc74d03b7>
|
CC-MAIN-2020-40
|
https://dcllp.com/photos/resources/Shareholdersdisputes_1.pdf
|
2020-09-25T23:27:27+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-40/subset=warc/part-00160-50bb8e61-7c5b-4d2c-bd34-dad6ca92b697.c000.gz.parquet
| 353,202,909
| 738
|
eng_Latn
|
eng_Latn
| 0.999269
|
eng_Latn
| 0.999291
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2744,
3792
] |
Pool Fence Affidavit
Department of Building Inspections 17140 Monument Circle Suite 100 Isle of Wight, Virginia 23397 (757) 365-6213
As the owner of the property located at _____________________________, in the County of Isle of Wight, I am aware of, and have received a copy of the requirements for the enclosure of a pool in accordance with the Virginia Uniform Statewide Building Code (VUSBC).
_____ Existing Fence:
I certify that my property has an existing fence which meets the requirements of the code for a swimming pool enclosure.
_____ Above Ground Pool/New Fence:
I take full responsibility, as the property owner, for ensuring that the pool fence enclosure is installed if any portion of the pool structure is less than 48 inches above the finish grade. Additionally, I am aware a permit is required for this fence and I will be solely responsible for obtaining the permit and installing the barrier.
Any pool site, new or existing, not properly protected by an APPROVED fence or barrier is subject to LEGAL ACTION. The use of the pool is PROHIBITED until final approval has been issued by the department of inspections.
______________________ _____________________ _______________
Owner's Name (Print)
Owner's Signature
Date
Permit #:___________ Issued by:___________ Date:_____________
Commonwealth of Virginia
The foregoing was sworn to and acknowledged before me this _____day of _____, 20___.
Notary Public:________________________
My Commission expires:_______
|
<urn:uuid:c0de97e0-d068-4341-892b-d3d3d3c4c8d7>
|
CC-MAIN-2021-21
|
https://cms9files.revize.com/wightcountyva/Central%20Permitting/BUILDING%20PERMIT%20FORMS/pool%20fence%20affidavit%207-2011.pdf
|
2021-05-18T00:43:49+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-21/subset=warc/part-00168-2bb1ba05-1421-4b90-a3f4-bbc46b4a29a5.c000.gz.parquet
| 194,793,182
| 311
|
eng_Latn
|
eng_Latn
| 0.997599
|
eng_Latn
| 0.997599
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
1496
] |
SYNOLAC ® 140 X 60
ARKEMA COATING RESINS
Product Application details
SYNOLAC ® 140 X 60 is a short alkyd resin based on soya oil with good reactivity, suitable for short curing oven time.
SYNOLAC ® 140 X 60 is recommended for general use in oven curing enamels and varnishes, nitrocellulose and acid curing lacquers.
Polymer Type
* Solventborne Alkyd
Sales Specifications
Other Characteristics 1
Formulation Guidelines
Note: Acid value and/or Hydroxyl value quoted relative to solid resin
1 The data provided for these properties are typical values, intended only as guides, and should not be construed as sales specifications
SOLUBILITY
SYNOLAC ® 140 X 60 is soluble in aromatic hydrocarbons, esters, ketones and glycol ethers. It has a limited solubility in alcohols and it is insoluble in aliphatic hydrocarbons.
COMPATIBILITY
SYNOLAC ® 140 X 60 is compatible with many others short oil drying and non-drying alkyds, OFPE, urea and melamine formaldehyde resins, benzoguanamine and nitrocellulose. It is incompatible with medium and long oil alkyds.
The statements, technical information and recommendations contained herein are believed to be accurate as of the date hereof. Since the conditions and methods of use of the product and of the information referred to herein are beyond our control, ARKEMA expressly disclaims any and all liability as to any results obtained or arising from any use of the product or reliance on such information; NO WARRANTY OF FITNESS FOR ANY PARTICULAR PURPOSE, WARRANTY OF MERCHANTABILITY OR ANY OTHER WARRANTY, EXPRESS OR IMPLIED, IS MADE CONCERNING THE GOODS DESCRIBED OR THE INFORMATION PROVIDED HEREIN. The information provided herein relates only to the specific product designated and may not be applicable when such product is used in combination with other materials or in any process. The user should thoroughly test any application before commercialization. Nothing contained herein constitutes a license to practice under any patent and it should not be construed as an inducement to infringe any patent and the user is advised to take appropriate steps to be sure that any proposed use of the product will not result in patent infringement.
See SDS for Health & Safety Considerations.
The products described in the document are not Medical grades designated for Medical Device applications.
Arkema has implemented an internal Medical Policy regarding the use of Arkema products in Medical Devices applications. Arkema has designated Medical grades to be used for Medical Device applications. Products that have not been designated as Medical grades are not authorized by Arkema for use in Medical Device applications. In addition, except for limited cases as determined by the Medical Device Policy, Arkema strictly prohibits the use of any Arkema products in Medical Device applications that are implanted in the body or in contact with bodily fluids or tissues for greater than 30 days.
For any use of Arkema's product in Medical Device applications, please contact Arkema's sales network.
Arkema Coating Resins
420, rue d'Estienne d'Orves
92705 Colombes Cedex - France
ARKEMA A French Société anonyme with a share capital of € 628.772.150 - Registered in Nanterre RCS 445 074 685
- 02/2014
|
<urn:uuid:81a507bc-b484-4d34-a0c5-eb153751e6cd>
|
CC-MAIN-2022-27
|
https://coatingresins.arkema.com/files/live/sites/shared_arkema/contents/pim-akeneo/f/acr_Industrial/p/MDM-12050-00-WW/SYNOLAC%20140%20X%2060.pdf
|
2022-06-28T05:55:50+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-27/subset=warc/part-00074-48f675b2-7fd4-43af-adb3-2a4ea7f82193.c000.gz.parquet
| 226,967,663
| 713
|
eng_Latn
|
eng_Latn
| 0.963016
|
eng_Latn
| 0.972555
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1066,
3270
] |
TOWN OF PENHOLD
BYLAW NO. 807/2022
COMMUNITY STANDARDS AMENDMENT BYLAW
TO INCLUDE URBAN CHICKENS
Being a Bylaw of the Town of Penhold, in the Province of Alberta, pursuant to provisions of the Municipal Government Act, being Chapter M-26 of the Revised Statutes of Alberta 2000, and amendments thereto, to provide for the amendment of Community Standards Bylaw 799/2021.
WHEREAS it is desirable for regulations which influence neighbourhood liveability to be located, as much as possible, in one bylaw; notwithstanding, Council has adopted various specific bylaws establishing community living standards,
WHEREAS community standards are intended to be reviewed regularly and amended as Council deems appropriate. Council’s desire is to influence respect for each other as neighbours and balance enforcement with the liveability of neighbours and neighbourhoods.
AND WHEREAS the Council of the Town of Penhold, in the province of Alberta, duly assembled, enacts as follows:
That the Community Standards Bylaw 799/2021 be amended to change the wording as follows:
Numeric order corresponding with any amendments herein.
Page 2 (amendment/add to definitions)
“Coop” means a fully enclosed outdoor weather proof structure, under 6 feet in height, used for the keeping of Urban Chickens (General Guidelines, Appendix I).
Page 3 (amendment/deletion to wording/add to definitions)
“License” means a Dog, Cat, or Urban Hen License issued by the Town to the Owner of a Dog, a Cat, or Urban Hen
Page 4 (amendment/deletion to wording/add to definitions)
“Owner” or “Owners” in respect to a Hen means:
a. A Person, partnership, association or corporation owning, possessing or having control over a Hen;
b. A Person permitting any Hen to remain about his/her house of Premises;
c. A Person whom an Urban Hen License has been issued; or a Person who collects or assumes responsibility for a Hen that has been seized pursuant to the provisions of this Bylaw. (Appendix)
**Page 5 (amendment/add to definitions)**
“Rooster” means a domesticated male chicken; Roosters are NOT permitted in The Town.
**Page 6 (amendment/add to definitions)**
“Urban area” means lands, located within the Town on which agricultural operations, including but not limited to the keeping of livestock, are neither a permitted nor a discretionary use under Bylaws of the Town.
“Urban Hen” means a female chicken.
“Urban Hen License” means a license issued pursuant to this Bylaw which authorizes the holder to keep urban hens on specific property, zoned R1, R2, and R4, within the Town.
**Page 17 (insert before Penalties)**
SECTION 18: RESPONSIBLE OWNERSHIP OF CHICKENS
**Keeping of Chickens**
18.1 No person in an urban area shall keep:
a) a Rooster;
b) a hen, other than an Urban Hen for which a valid Chicken License has been issued; or
c) more than four (4) Urban Hens.
18.2 A person may keep up to four (4) Urban Hens upon:
a) approval of an Urban Hen License application; and
b) payment of an annual Urban Hen License fee as set out in the Town of Penhold Rate Bylaw.
18.3 An Urban Hen License may be issued or renewed if the Town is satisfied that all outlined requirements within **Schedule A**: Urban Hen Permit/License Application Process are complete, including but not limited to:
a) the applicant is the owner of the property on which the Urban Hens will be kept; or that the owner of the property has provided written consent to the applicant;
b) the land use designation of the property on which the Urban Hens will be kept allows the placement of a Coop for the keeping of Urban Hens;
c) the applicant resides on the property on which the Urban Hens will be kept;
d) all required information has been provided;
e) the applicant has taken a course on the safe handling of hens and eggs, prior to issuance of a license;
f) the applicant has registered with Alberta’s Premises Identification Program (PID);
g) the applicant has complied with all other Provincial and Federal Regulations for the keeping of chickens;
h) the application has completed the Urban Chicken Neighbour Acknowledgement Form (Appendix II); and
i) the applicable license fee has been paid.
18.4 The maximum number of Urban Hen Licenses that may be issued in the Town of Penhold shall be twenty-five (25).
18.5 An Urban Hen License is valid for the period of January 1 to December 31 of the year in which it is issued and must be renewed annually prior to February 28 of each subsequent year (Appendix III):
a) Urban Hen License fees shall not be reduced or prorated no matter the month of purchase;
b) Urban Hen License fees shall not be refunded or rebated
18.6 An Urban Hen License is not transferable from one person to another.
18.7 An Urban Hen License is not transferable from one property to another except;
a) when a license holder has moved to a new property within the Town, then:
i. the license holder may apply to transfer the license; and
ii. an inspection of the new property must be carried out to determine the license holder is still able to meet all requirements for an Urban Hen License at such a property.
18.8 A person to whom an urban hen license has been issued shall produce the license upon the demand of a Peace Officer.
18.9 An Urban Hen License may be revoked or may not be renewed by the Town if:
a) the applicant or license holder does not meet or no longer meets the requirements for an Urban Hen License as set out in this Bylaw;
b) the applicant or license holder furnishes false information or misrepresents any Bylaw, fact or circumstance required pursuant to this Bylaw;
c) the applicant or license holder has, in the opinion of the CAO or designate, based on reasonable grounds, contravened any part of this Bylaw whether or not the contravention has been prosecuted;
d) the applicant or license holder fails to pay a fine imposed by a court for a contravention of this Bylaw or any other applicable Bylaw related to the keeping of animals/livestock;
e) the applicant or license holder fails to pay any fee required by this Bylaw;
f) the applicant fails to comply with any applicable Provincial and Federal Regulations for the keeping of chickens; or
g) in the opinion of the Town based on reasonable grounds, it is in the public interest to do so.
18.10 In the case of a refusal or revocation of an Urban Hen License, the applicant will be given the reasons, in writing, within ten (10) days of the refusal. The revocation or refusal may be appealed pursuant to the provisions of this Bylaw.
Responsibilities of Owners Keeping of Urban Hens
18.11 A person who keeps Urban Hens must:
a) ensure that Coop size does not exceed 100 sq. ft.;
b) provide each Urban Hen with food, water, shelter, light, ventilation, care, and opportunities for essential behaviours such as scratching, dust-bathing, and roosting, all sufficient to maintain the urban hen in good health;
c) maintain the Coop in good repair and sanitary condition, and free from vermin and noxious or offensive smells and substances;
d) construct and maintain the Coop to prevent any rodent from harbouring underneath, within, or within its walls, and to prevent entrance by any other animal;
e) keep a food container and water container in the Coop;
f) keep the Coop and pen secured at all times;
g) remove leftover feed, trash, and manure in a timely manner;
h) store feed within a fully enclosed container;
i) store manure within a fully enclosed container, and store no more than 85 litres (3 cubic feet) of manure at any time;
j) remove all other manure not used for composting or fertilizing and dispose of such in accordance with Town Bylaws
k) follow biosecurity procedures outlined by the Canadian Food Inspection Agency to reduce potential for disease outbreak; and
l) keep Urban Hens for personal use only.
18.12 No person who keeps Urban Hens shall:
a) sell eggs, manure, meat, or other products derived from an Urban Hen;
b) slaughter any Urban Hen on the property;
c) dispose of an Urban Hen except by delivering it to a farm, abattoir, veterinarian, or other operation that is lawfully permitted to dispose of such; and
d) keep an Urban Hen in a cage, kennel, or any other form of shelter other than a Coop.
Page 19: (renumber and add Section 19: Penalties)
Page 20: (renumber and add Section 20: Severability and Transition)
Pages 21-22 (amendment/add)
| Description | Code | Fine $125.00 | Fine $250.00 | Fine $1,000.00 |
|--------------------------------------------------|--------|--------------|--------------|----------------|
| Rooster on premises | 18.1 a.| | | |
| Unlicensed Hens on premises | 18.1 b.| | | |
| Keeping more than 4 Hens | 18.1 c.| | | |
| Fail to obtain an Urban Hen License | 18.2 a.| | | |
| Fail to purchase an annual Urban hen License | 18.2 b.| | | |
| Fail to produce a valid Urban Hen License | 18.8 | | | |
| Fail to follow regulations for Keeping of Urban Hens | 18.11 & 18.12 d. | | | |
| Sale of products derived from an Urban Hen | 18.12 a.| | | |
| Slaughter Urban Hen on property | 18.12 b.| | | |
| Fail of proper disposal of a deceased Hen | 18.12 c.| | | |
Read a first time this 10th day of January, 2022.
Read a second time this 28th day of February, 2022.
Read a third and final time; and passed this 28th day of February, 2022.
Mayor
Chief Administrative Officer
Policy Statement:
This procedure provides the process for the issuance of an Urban Hen Permit and Urban Hen Licenses for the Town of Penhold. This procedure establishes authority, procedure, timelines, and provides direction and consistency for all staff and permit applicants associated with the issuance and application of Urban Hen Permits and Urban Hen Licenses.
ACTION STEPS
Things to Know Before You Apply
- The intention of the program is to support urban hen keeping in the Town of Penhold as a hobby and non-commercial activity. Licensed urban hen keepers cannot sell hens or any products produced by one’s hen(s) as they are for personal use only.
- It is in your best interest not to invest in chickens, equipment, etc. until you obtain your permit.
- An application is not a guarantee that you will obtain a permit but instead is a request for a permit.
- The Town of Penhold has the discretion and authority to deny a request for a Permit due to documentation of medical concerns from neighbouring properties and/or any other concerns.
- There is a cap of no more than twenty-five (25) urban hen sites within the Town of Penhold:
- A maximum of four (4) urban hens per site;
- Roosters are not permitted;
- A maximum size of one hundred (100) sq ft and 1.8 metres in height;
- Outdoor enclosure must be a minimum of eight (8) to ten (10) sq. ft.;
- There will be no relaxations permitted.
- The Town of Penhold has the discretion and authority to revoke and/or not renew an urban hen license.
- Residential areas permissible to house urban hens include R1, R2, and R4 zoning.
Step 1: Reviewing Town of Penhold Bylaws:
- It is important to understand the commitment and responsibilities required to become a successful and safe urban hen keeper. These documents will ensure applicants understand the expectations that the Town of Penhold has for urban hen keepers.
- Review Community Standards Bylaw Amendment 807/2022
Step 2: Urban Hen Keeping Course:
- Complete any one of the below urban hens keeping courses:
- Alberta Farm Animal Care (AFAC), Backyard Chicken and Small Flock Care Workshop or email AFAC for further information
- River City Chickens (or University of Alberta Botanic Garden), Chickens 101
- This is important as it allows applicants to learn and understand how to properly provide and care for their urban hens.
- The certificate or documentation obtained from the completed course is required to be presented throughout the application process. Without which the applicant will not be approved for a permit.
Step 3: Alberta’s Premises Identification Program (PID)
- Register with Alberta’s Premises Identification Program (PID).
- As part of the Animal Health Act, owners of hens must register with the Animal Premise Identification Program https://www.alberta.ca/register-with-the-animal-premises-identificationprogram.aspx and obtain a premise identification number for the urban hens.
- This requirement is a part of a traceability system designed to address potential threats of disease outbreaks that could affect animal health, public health, and food safety.
Step 4: Obtaining your Development Permit:
- An electrical permit may be required for the construction of your chicken coop. Under the Alberta Safety Codes Act and Permit Regulations, and to ensure proper set up of your urban hen coop and safety of urban hens, an Electrical Permit is required to install, alter, or add to an electrical system.
- This applies to the installation of a heat lamp, light fixture, or any other type of electrical components in an urban hen coop.
- If an applicant plans to install electrical fixtures in the coop, please apply for an electrical permit through IJD Inspections Ltd.
- Applicants will be required to submit the following:
- Site plan showing the dimension of the rear/side yard of the proposed property location and the dimensions of the hen coop and run (example: Appendix I);
- Certificate obtained from urban hen keeping course;
- Provincial Premise Identification (PID) number from the Province of Alberta;
- The number of urban hens (maximum of four (4));
Owner authorization if property is not owned by applicant;
- Once the application has been received, including the Urban Chicken Neighbour Acknowledgement document (Appendix II), it will be provided to the Business License Officer, as a Request for Decision (RFD), for approval.
**Step 5: Obtaining your Urban Hen License:**
- Once you have received an approved Permit you are ready to license your Urban Hen(s) (Appendix III).
- Applicants are required to show their approved Permit to the Town of Penhold before a license will be issued.
- Urban Hen Keepers are required to pay an annual urban hen license fee of $70.00. This is a flat rate fee regardless of number of urban hens.
- Urban hen licenses are valid for the period of January 1 – December 31 of the year in which it has been issued.
- Urban hen licenses must be renewed annually prior to February 28th of each subsequent year.
- Urban hen license fees will not be reduced, prorated, or refunded no matter the month of purchase.
- Urban hen license holders must produce the license upon request of a Peace Officer.
Once the applicant has paid for the urban hen license fee, a certificate will be given to the applicant and they can begin to enjoy being an urban hen keeper.
Town of Penhold
Urban Chicken Neighbour Acknowledgement Form
As outlined in the Urban Hen Permit/License Application Process, a person wishing to get an Urban Hen license must inform their neighbours on each side of their residence.
By informing your neighbours and having them complete this form, you are compliant with the process to acquire an Urban Chicken license.
Resident interesting in obtaining an Urban Chicken License:
Name: ____________________________________________________________
Street Address: ________________________________________________, Penhold
Mailing Address: _______________________________________________ Postal Code: _______________
Email Address: ___________________________________________________
Phone Number: ________________________ Cell Number: ________________________
_______________________________________________________________
I, _____________________________________ a neighbour of __________________________
_________________________________________ and residing at __________________________,
Penhold, have been advised of __________________________ wish to have Urban Chickens.
_______________________________________________________________
Date ___________________________ Signature ___________________________
I, _____________________________________ a neighbour of __________________________
_________________________________________ and residing at __________________________,
Penhold, have been advised of __________________________ wish to have Urban Chickens.
_______________________________________________________________
Date ___________________________ Signature ___________________________
2022 URBAN HEN LICENSE
In accordance with:
CSB Amendment Bylaw 807/2022
This is to certify that:
Name of Applicant
Has this day been approved for Urban Hen Keeping at
“Applicant’s physical address” of the Town of Penhold
Urban Hen Keeping License # “0000”
until 12/31/2022
unless the license be sooner suspended or forfeited, and this license is issued to
the said applicant and held by the Town of Penhold subject to any and all Bylaws,
rules and regulations that are now or hereinafter may be in force. This license is
non-transferrable to any persons and/or property.
License Officer
|
<urn:uuid:5f08469c-f3ab-44ea-a7ba-276487400afe>
|
CC-MAIN-2022-27
|
https://townofpenhold.ca/Home/DownloadDocument?docId=773cce7d-f202-4a2d-81d8-90b0b8335066
|
2022-06-26T20:50:19+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-27/subset=warc/part-00021-48f675b2-7fd4-43af-adb3-2a4ea7f82193.c000.gz.parquet
| 633,482,330
| 3,739
|
eng_Latn
|
eng_Latn
| 0.947697
|
eng_Latn
| 0.995443
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
1779,
3745,
6007,
8246,
9932,
11541,
14097,
15355,
17028,
17623
] |
Oscar nominees will all sniff the sweet smell of success on Sunday night.
While it won't be statuettes for all, each nominee will receive an upmarket British car air-freshener inside their coveted goody bag.
Sweet smell of success: Charabanc was created by Carrie Hindmarsh (right) and Barbara Behan
Luxury in-car fragrance firm Charabanc (charabanc.com) was created by ex-M&C Saatchi advertising executives Carrie Hindmarsh and Barbara Behan (wearing hat). They got the idea after spraying essential oils around their car when travelling to meetings.
Barbara said: 'We have luxury fragrances for the home so why not the car, where we spend so much time?'
Flexible: The scent-holders can fit in the cup holder, hang from the rear-view mirror or attach to the air vent with a magnetic clip
The scent-holders can fit in the cup holder, hang from the rear-view mirror or attach to the air vent with a magnetic clip.
Their stencilled-steel exteriors are hand-spun in the West Midlands before being encased in moulded leather and are £145 to you and me. Refills cost £35.
|
30962dba-23e4-49cb-b8e0-27aa5aad9a4e
|
CC-MAIN-2020-16
|
https://cdn.shopify.com/s/files/1/0137/1324/4218/files/Daily_Mail.pdf?2332
|
2020-03-30T17:49:36+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-16/subset=warc/part-00132-5e0433ee-fa15-4837-b2dc-d6f38301af97.c000.gz.parquet
| 417,949,551
| 245
|
eng_Latn
|
eng_Latn
| 0.998455
|
eng_Latn
| 0.998669
|
[
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
554,
1073
] |
This template can be used for multiple purposes:
* It helps schools to meet the requirements (as set out in guidance) to publish information on their Primary PE and sport premium
* It enables schools to effectively plan their use of the Primary PE and sport premium
* It will be an effective document to support Ofsted inspections enabling schools to evidence progress in Physical Education (PE) and evidence swimming attainment, which forms part of the PE National Curriculum. We would recommend schools consider the Intent, Implementation and Impact of any spend, as examined within the Education Inspection Framework.
It is important that your grant is used effectively and based on school need.
Schools must use the funding to make additional and sustainable improvements to the quality of the PE, School Sport and Physical Activity (PESSPA)
they offer. This means that you should use the Primary PE and sport premium to:
* Build capacity and capability within the school to ensure that improvements made now will benefit pupils joining the school in future years
* Develop or add to the PESSPA activities that your school already offers.
The Primary PE and sport premium should not be used to fund capital spend projects; the school's core budget should fund these. Further detail on capital expenditure can be found in the updated Primary PE and sport premium guidance.
The Primary PE and sport premium guidance, outlines 5 key priorities that funding should be used towards. It is not
necessary that spending has to meet all the key priorities, you should select the priorities that you aim to use any funding towards.
Although completing this template is not a requirement for schools, schools are required to publish details of how they spend this funding. Schools must also outline what the impact this funding has had on pupils' PE and sport participation and attainment and how any spending will be sustainable in the future. All funding must be spent by 31st July 2024.
The Department for Education has worked closely with the Association for Physical Education (afPE) and the Youth Sport Trust (YST) to develop this template and encourages schools to use it. This template is an effective way of meeting the reporting requirements of the Primary PE and sport premium.
Review of last year's spend and key achievements (2022/2023)
We recommend you start by reflecting on the impact of current provision and reviewing your previous spend.
Key priorities and Planning
This planning template will allow schools to accurately plan their spending.
CPD for teachers.
£5000 for 5 teachers
Primary generalist teachers. Pupils – as they will take part.
Key Indicator 1: Increased confidence, knowledge, and skills of all staff in teaching PE and sport.
Introduce a sport leader's and eco council.
Lunchtime supervisors and coaches - as they need to lead the activity.
Key Indicator 1: Increased confidence, knowledge, and skills of all staff in teaching PE and sport.
£1000 costs for sports coaches to deliver training and mentoring sessions and play resources.
Provide additional Extracurricular sports/activities for pupils.
Sports coaches - as they need to lead the activity.
Key indicator 2: Engagement of all pupils in regular physical activity.
£5000 costs for sports coaches to deliver activities and resources.
Provide additional sporting festivals and competitive perpetuities pupils.
Key indicator 2: Engagement of
Introducing children to
Sports coaches - as they need to lead the activity.
Key achievements 2023-2024
This template will be completed at the end of the academic year and will showcase the key achievements schools have made with their Primary PE and sport premium spending.
Swimming Data
Meeting National Curriculum requirements for swimming and water safety.
Priority should always be given to ensuring that pupils can perform safe self-rescue even if they do not fully meet the first two requirements of the National Curriculum programme of study
What percentage of your current Year 6 cohort are able to perform safe self-rescue in different water-based situations?
0%
extends to enhancing the overall swimming program, providing targeted interventions, and exploring innovative teaching methods. By doing so, we aim to significantly increase the percentage of our Year 6 cohort proficient in utilizing a range of strokes effectively, fostering water safety and confidence among our students.
Our current Year 6 cohort's proficiency in safe self-rescue in various water-based situations varies based on the levels defined by Swim England School Charter resources. Utilizing the resources available at https://www.swimming.org/schools/, the breakdown of our students' self-rescue abilities is as follows:
Level 1: 71% - A majority of our students have attained the fundamental skills necessary for safe self-rescue in basic water scenarios. This level demonstrates a foundational understanding of water safety principles. Level 2: 22% - A significant portion of our Year 6 cohort has progressed to a level where they can perform safe self-rescue in more complex water situations. This reflects an increased competency and confidence in various aquatic environments. Level 3: 6% - A smaller percentage of students have achieved an advanced level of self-rescue
provide a more inclusive and comprehensive learning environment. This approach aligns with our commitment to fostering a positive and enriching experience for every student, ensuring that they benefit from enhanced water safety skills and confidence in and around aquatic environments.
Signed off by:
|
<urn:uuid:329ed979-3268-4aa6-bd43-145ee77143cd>
|
CC-MAIN-2024-51
|
https://birchfld.bham.sch.uk/images/keyinfo/funding/sportpremium/b-sp2324.pdf
|
2024-12-11T03:44:23+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-51/subset=warc/part-00106-b392068a-8e35-4497-8fab-a691b1a71843.c000.gz.parquet
| 110,749,461
| 1,064
|
eng_Latn
|
eng_Latn
| 0.997366
|
eng_Latn
| 0.998298
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
1500,
2463,
2570,
2775,
3088,
3349,
3535,
3735,
4013,
5331,
5618,
5634
] |
As-Built Permits
Not everyone knows that you will need a building permit to construct, remodel, or repair structures. This is where the "As-Built" building permit comes into play.
The California Code of Regulations, Title 24, Building Standards Code require that no building or structure may be erected, constructed, enlarged, altered, repaired, moved, improved, removed, converted or demolished unless a separate permit for each building or structure has been issued been constructed in accordance with the approved plans. However, the inspector has not been able to observe the structure during the various stages of construction. This situation can be a difficult one for the inspector as well as the applicant. The procedures to be followed when inspections of such structures are performed as described below.
The permits issued for such structures are based upon approved as-built plans. The inspector signing off as-built plans is being asked to verify that the structure has
Responsibilities of the Permit Holder
- There is a legitimate public expectation that when we issue a permit authorizing construction today, that the work authorized will comply with the codes and ordinances in effect today. Therefore, we review the plans as if you were applying to do the work today. The existing work is the structure as it existed before the work which was done without a permit, not the structure as it exists today.
- Plans must be legible, drawn to recognized architectural standards, and contain the information necessary in order to be reviewed by the applicable review agencies. Plans must include all items which are applicable to the project on the Department checklists for residential or commercial structures. Plans not meeting these requirements will not be accepted.
- If the as-built work includes a foundation or other structural element with embedded reinforcing steel, include written verification from a testing agency that the reinforcing steel has been installed according to the plans. This is required prior to approval of the building permit application. The testing agency shall be qualified to perform such analysis. Ultrasonic, non-destructive testing is typically used for this testing.
The following procedures must be followed, if applicable to the permitted work. Items to be exposed should be exposed prior to calling for inspection:
1. Take the necessary measures to verify the location of property lines so that the setbacks shown on the plans can be verified. When the setbacks are in question, a survey by a licensed surveyor will be required if the location of the property lines cannot be definitely verified.
3. Make the means of attachment of the structure to the foundation accessible for inspection. When the means of attachment are visible in a crawl space, an access opening must be within 20 feet of the means of attachment, and an access path a minimum of 18 inches in height and width must be available to the inspector. In slab construction the wall coverings must be removed to show the means of attachment.
2. If the new work includes a foundation, expose a portion of the foundation so that the size and depth can be determined.
4. Anchor bolts must comply with the presently adopted code, and their correct installation must be verified by the Building Inspector. Note: The installation instructions on listed epoxy systems for retrofitting hold downs typically require special inspection, which will be required by the department.
5. Make the components of the electrical system visible by removing cover plates from receptacles, fixtures, sub panels, and services. Pull receptacles and switches out of all boxes.
6. Remove wall coverings from plate to plate in stud days containing electrical service boxes and subpanels.
8. If there is a bathroom, remove the wall coverings so that the all supply and waste fittings in one bathroom are visible.
7. Remove exterior or interior wall coverings so that all unconventional connections (beam saddles, hold downs, straps, all-thread, etc.) are visible for inspection.
9. If there is a kitchen, remove the wall coverings so that the all supply and waste fittings in the kitchen are visible.
10. If there is a loop vent in the kitchen, remove material so that it is visible.
12. Engineered shear nailing and shear nailing at required braced wall panels must be inspected, as follows:
11. In all cases, at least 25% of the interior wall coverings must be removed, in areas of connections between building elements.
- Trim or other coverings must be removed to accomplish this requirement if necessary.
- When shear nailing is covered with portland cement plaster (stucco), a testing agency qualified to perform such analysis or a licensed engineer other than the project engineer must observe the removal of a minimum of a 4 ft. by 8 ft. section of the exterior stucco, and verify that the shear nailing meets the requirements of the building code and the approved plans. The area removed must show a minimum of 4 ft. of edge nailing of two vertical adjacent pieces of shear plywood, and if applicable to the structure, must show a minimum of 4 ft. of the connection between first and second floors. The testing
agency or engineer must verify in writing that the shear plywood when first exposed met the requirements of the building code and the approved plans.
- When shear nailing is covered by roofing materials, a testing agency qualified to perform such analysis or a licensed engineer other than the project engineer must observe the removal of a minimum of a 4 ft. by 8 ft. section of the wood siding, and verify that the shear nailing meets the requirements of the building code and the approved plans. The area removed must show a minimum of 4 ft. of edge nailing of two adjacent pieces of shear plywood, the testing agency or engineer must verify in writing that the shear plywood when first exposed met the requirements of the building code and the approved plans.
- When shear nailing is covered with wood siding, a testing agency qualified to perform such analysis, or a licensed engineer other than the project engineer must observe the removal of a minimum of a 4 ft. by 8 ft. section of the wood siding, and verify that the shear nailing meets the requirements of the building code and the approved plans. The area removed must show a minimum of 4 ft. of edge nailing of two vertical adjacent pieces of shear plywood, and if applicable to the structure, must show a minimum of 4 ft. of the connection between first and second floors. The testing agency or engineer must verify in writing that the shear plywood when first exposed met the requirements of the building code and the approved plans.
NOTE: If the nailing on the shear exposed does not meet the requirements of the building code and the approved plans, corrective measures must be taken to make the shear plywood comply.
- Make the components of the mechanical system visible by removing cover plates, access panels, and as otherwise required by the inspector. Provide a gas pressure test on all new gas lines.
- Remove any other wall coverings which the inspector deems necessary to inspect the structure.
- Make the components of the plumbing system visible by removing cover plates, access panels, and as otherwise required by the inspector.
- Pictures of the work will NOT be accepted in lieu of the inspection procedures described above.
In addition, the inspector may require that an engineer licensed by the state of California:
- Letters from the project architect or engineer may be accepted in lieu of one or more of the above requirements, provided that the letter states unequivocally that the licensed professional has observed the installation of the item in question and that it complies with the approved plans and specifications, and with the applicable codes. The final determination of acceptance of such letters will be made by the Building Official.
- Provide written verification by an electrical engineer licensed by the State of California that the electrical system meets present code.
- Provide written verification by a mechanical engineer licensed by the State of California that the plumbing system meets present code.
- Provide written verification by a mechanical engineer licensed by the State of California that the mechanical system meets present code.
- Provide written verification by an engineer licensed by the State of California that the building is structurally sound.
Inspection procedures are found in the administrative provisions of the codes and are not appealable to the Building Board of Appeals. Decisions of the Building Official relative to these procedures can be appealed to the Community Development Director, whose decision is final.
|
<urn:uuid:4e098f09-eeb1-4805-b26f-26eaab475877>
|
CC-MAIN-2021-43
|
https://www.cityoflakeport.com/Community%20Development/Building%20Division/2018%20As-Built%20Permit%20Information.pdf
|
2021-10-27T19:41:35+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00033-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 845,935,373
| 1,670
|
eng_Latn
|
eng_Latn
| 0.998392
|
eng_Latn
| 0.998639
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
5216,
8776
] |
(1) Afghan War...
ghan government. (KP)
Taliban to resume peace talks with Af- three sectors that are extremely vulnerable, he added.
According to the report, there is an extra budget allocated to the ministries of defense and interior affairs, the national security council and the National Directorate of Security (NDS),
Analysts and human rights activists meanwhile speculate that this year's cost of war will far exceed that of 2014. Women's Rights Activist Najiba Ayobi said: "It is very clear that this year the cost of war and fundamentalism is too high because of ongoing conflict." The findings of this study shows that 60 percent of the national budget is being spent on security and only four percent on the health sector.
Ministry of Defense gets an additional $1.5 billion USD over their annual budget; the Ministry of Interior gets almost $1.2 billion USD extra; National security Council gets over $1.5 million USD and the NDS an additional $200 million.
(2) Massoud Claims ...
In addition, civilians have also paid a really high price – since 2001, an estimated 26,272 people have been killed in the conflict. (Tolonews)
management," Massoud said while meeting ANA commanders who recently fought in Kunduz.
Ghani has however said on different occasions that he would distance security institutions from politics.
Massoud's remarks came a day after Ghani ordered the appointment of a number of key military officials to fill posts which were being run by caretakers.
Political interference in appointments and promotions aren't acceptable, Ghani said while visiting war-hit city of Kunduz last week.
sovereignty.
In a recent move, the defense ministry recommended a number of proposals to Ghani in an effort to bring about necessary reforms within the ministry. But on Sunday night, Ghani promoted 61 ANA officers – some to heads of departments and some as generals - in a bid to increase capacity building, maintain security and protect national
The Ministry of Defense welcomed the appointments and said it was important to fill some key vacancies in efforts to curb militancy and to strengthen security.
Meanwhile, a number of ANA commanders who participated in the Kunduz war have complained about what they say are serious issues soldiers fighting the Taliban are facing.
"Sixty to 70 generals retired last year and their posts remained vacant. A decision was taken to fill some vacancies," said a spokesman for the ministry of defense Gen. Habiburrahman Afzal.
One of their main concerns was that reinforcements took so long to reach Kunduz.
Military analysts meanwhile accuse government of establishing the ANA according to ethnic structures. They have called for a nonpolitical army.
"One of the key problems is that reinforcements did not arrive quickly so that we could secure the area and move forward. We had to clear the area and move forward and take control of more areas. But we were supposed to defend the same areas as reinforcements took time to reach us. If they had been there the enemy would not have been able to confront us," Khalid Amir, a commander of the Afghan special forces said.
"We are still a long way from having nonpolitical police and army. Currently we do not have nonpolitical police or army. Even the country's political structures have been formulated on the basis of certain ethnic and ideological perspectives," military commentator Jawed Kohistani said.
(3) Breakthrough...
"Today we need to have such an army [nonpolitical] keeping in mind that honesty, patriotism, qualifications and social justice are required for the appointments," Kohistani said. (Tolonews)
of Pakistan and other stakeholders and that some progress is expected in the coming days.
The revival of the fragile peace process would be one of the key agenda items during Prime Minister Nawaz Sharif's upcoming visit to the US, the
"We have kept saying this for a long time that eventually we will have to go back to reconciliation," he said. Now, he claimed, there would be some 'breakthrough' soon. "We are optimistic that detractors will fail and the reconciliation process will resume soon," The Express Tribune quotes the unnamed official as saying.
official said. Mohammad Nawaz Sharif who left Islamabad for Washington this morning is expected to return home on October 25.
that he would urge Sharif to convince
President Obama had said last week
(4) Health Minister...
Jirga (Lower House of Parliament) to answer questions over the spike in drug addicts in Afghanistan.
"As long as government officials are involved in distributing drugs to addicts all efforts will be undermined which is unfortunately a big challenge," he said.
Feroz warned that unless the guilty officials are brought to justice, all efforts to fight the scourge will be useless.
In addition, he complained the government has not budgeted for building facilities to treat addicts.
"Until we are provided with a budget, our strategy to treat addicts will fail," he said adding that the ministry of finance has not given his ministry enough money to deal with this problem.
He also said that more than 80 percent of drug addicts in the country have received treatment but that at least 60 percent have gone back to their old habits.
Feroz states that despite 45,000 addicts being treated a year, the health ministry's efforts to curb the problem are no helping.
Robaba Parwani, an MP, said: "The number of drug addicts increase daily in Kabul and there are not enough centers to treat them."
Meanwhile, the MPs also complained about the lack of drug addiction treatment centers in the country, which they directly link to the sharp increase in addicts in the country.
However other lawmakers stressed the need for the counter-narcotics law to be amended in order to resolve the issue.
Meanwhile, deputy minister of interior affairs on counter-narcotics Baz Mohammad Ahmadi has linked the increase in the number of drug addicts to the insecurity in the country.
Naeem Lalai, the head of the Wolesi Jirga's committee on counter-narcotics said: "As long as profound amendments are not brought to the counternarcotics law, all our anti-drugs efforts will fail."
"Unfortunately drugs have a direct link to terrorism," he said.
He added that the poppy cultivation has however dropped by 19 percent in 2015 compared to last year and that drug production has dropped by 48 percent compared to last year. (Tolonews)
Insecurity, insurgent attacks, withdrawal of foreign forces and government neglect over counter-narcotics has created problems in their antidrugs drive, Ahmadi said.
(5) Iran Ready ...
Agency (AISA) noted that In an attempt to boost foreign trade, Afghanistan needs to expand trade relations with the neighboring country and Iran's role is valuable in investing in Afghanistan.
According to presented statistics, Iranian goods imports to Afghanistan reach to more than $ 2 billion annually which have been said that in contrast, Afghanistan's export to Iran is in a low level.
Iran Chamber of Commerce has also vowed that Iran's exports and investments will increase in Afghanistan.
Previously, President Ashraf Ghani in his visit to Iran urged Iran's private sector to invest in Afghanistan.
The National Unity Government's efforts to improve relations with neighboring Iran is coming as a follow-up to former president Hamid Karzai's visit to Tehran in 2013.
During his recent visit to Tehran, Afghan and Iranian presidents stressed on their will for starting a new chapter in relations between the two countries and stepping up cooperation to deal with challenges common for both countries.
The two leaders agreed on enhanced efforts by the two countries to tackle the compounding security threats posed by terrorism as well as drug production and trafficking.
(6) Nations to...
The two countries have also signed agreements of cooperation in other areas such as refugees and economic ties between the two countries. (ATN)
national deployments are not in doubt, he said.
He declined to give details. But a second senior NATO official said Germany, Turkey and Italy were willing to remain in Afghanistan at their current levels.
"Several of our largest contributors have already communicated with us that they will remain in their current posture," Breedlove told Reuters.
Italian Prime Minister Matteo Renzi said last week that Italy is considering keeping its soldiers in Afghanistan for another year. The official said that "our understanding is that is going to happen."
Germany, as the top NATO-country contributor, has around 850 troops in
Afghanistan, followed by Italy with 760 and about 500 for Turkey, according to the latest NATO data.
Unlike the United States, NATO has never set an end date to its "Resolute Support" training mission in Afghanistan, currently a 6,000-strong force that also includes troops from some 40 countries, including NATO members, the United States and their allies.
"We should make any changes on our troop structure based on conditions on the ground, not on schedules," Breedlove said. "Other nations are already ringing in that they are committed."
A formal decision is expected to come at NATO's next meeting of its foreign ministers in Brussels in early December, a third official said.
A U.S. military strike in Kunduz that hit an Afghan hospital run by Doctors Without Borders, or Medecins Sans Frontieres (MSF), also generated international outcry and underscored the perils of leaving a fragile country too quickly.
Although Afghan forces have recaptured the strategic northern city of Kunduz, its brief fall to the Taliban last month underscored concerns about the capabilities of Afghanistan's security forces.
U.S. President Barack Obama had aimed to withdraw all but a small U.S. force before leaving office, pinning his hopes on training and equipping local forces to contain Taliban militants fighting to return to power.
Washington has spent around $65 billion on preparing the fledgling Afghan security forces of about 350,000 personnel.
But now he will slow plans to draw down U.S. troops from Afghanistan and instead keep the current force of 9,800 through most of 2016 before beginning to trim levels from 2017.
That is still far from complete, with Germany's Defence Minister Ursula von der Leyen saying last week in Brussels that NATO needed to make sure the Afghans were capable of keeping their country stable. (Reuters)
(7) Abdullah Meets ...
Chief Executive explained the stance of the National Unity Government.
(8) Drug Dealing...
Matters relating good governance, reforms, electronic national identity card, economic programs of the government, peace process, relations with Pakistan, fall of Kunduz, security developments and EU cooperation with Afghanistan were discussed. Besides stressing for reforms in the government, the ambassadors assured EU its firm cooperation with the National Unity Government in implementing its programs. (BNA)
bosses remain undisclosed, we will continue to see such people within our system and in the leadership," a university lecturer Abdul Hamid Safwat said. (Tolo News)
(9) ANSF t...
tired to launch more of its attacks on the villages and districts of the country.
Insecurity has significantly increased throughout the country, civilian deaths have shot up, and the Afghan security forces are taking large, and potentially unsustainable casualties.
The 2015 fighting season between the Taliban and Afghan security forces is turning out to be the bloodiest on record since 2001.
The pressure from the calendar apparently led Afghanistan to begin preparing operation plans for the three months winter-offensive.
Meanwhile, Afghan army commanders have also stress on winter operations to destroy and eliminate terrorist groups.
Heavy snows and freezing temperatures could arrive as soon as next two months.
"We have our own projections and our operational plans in three months of winter season," said Gen. Abdul Rahman, deputy of defense ministry's department of strategic public relations.
In October 2015, President Barack Obama announced to keep around 5,500 troops in Afghanistan beyond 2016.
However, winter will paralyze movement by most Afghans in the hills, including both the anti-Taliban fighters and the millions of Afghan civilians who are liable to face acute hardship or death in a harsh winter coming after the longest drought in the country's memory.
This comes as the Afghan government tries to wind down its military operations against terrorist groups; which Afghanistan's future remains precarious at best. (ATN)
(10) NATO Launches...
demonstrate that NATO "can deal military engagements to more subtle
with everything from conventional hybrid warfare techniques and propa-
ganda."
Vershbow said the geopolitical situation is considerably more unstable than the last time such large-scale exercises were held during the Cold War, citing Russia's annexation of Crimea, support of eastern Ukrainian separatists and attacks against moderate rebels in Syria, as well as the spread of terror groups into Libya and Syria.
The Sicilian city Trapani will be the operational center for the exercise that begins Wednesday and runs through early November, extending into Spain, Portugal and adjacent waters. The exercise envisions a fictitious invasion by a large country of a small alliance member, creating a crisis with religious and ethnic dimensions, threatening energy supplies and navigational freedom with risks of terrorism and cyberattacks.
"In this new world, NATO's allies and partners must be able to move quickly and act decisively," he said.
At a news conference, Vershbow denied that the fictitious aggressor was Russia.
(11) Karzai wants...
"That is not to say that some of the challenges we are addressing and testing our forces for are not analogous to the challenges we would face were we to have a conflict with Russia," he said.(AP)
unfortunately, yes, there is more radicalism in Afghanistan, and indeed, in the whole region, than there was ever before. That is why I've been calling for a long time now for re-thinking of the strategy in the fight against terrorism; for re-evaluating whether this struggle against terrorism is a failure or if there's a broader issue at hand here that we don't know yet about or we don't understand. Therefore, you're right, it's very much time, rather long overdue, to reconsider the whole question and to find answers together with major countries in this region, meaning Russia, China and India. In other words: the U.S. and its NATO allies must now begin to consult with major powers and explain it. The next question Shevardnadze asked was whether the world's greatest powers have failed in Afghanistan. Karzai responded: We must first find out if this has been a failure, but if this is not described as a failure, by the U.S. and its allies, then we need to have explanations from them on what else is the reason. Therefore, we have questions, too, here in Afghanistan, as people have questions around the world. There's no doubt that radicalism has increased, there's no doubt that extremism has increased, there's no doubt that suffering has increased, especially in Afghanistan and in the Middle East, so we need answers and we need to scratch our heads and explain it.
Karzai said: That was very unfortunate for people of Kunduz, and then the suffering that followed, for the civilians and the bombing of the Medecins Sans Frontieres Hospital – all of that should bring us back to your first question on how come there's an increasing radicalism and who is responsible for this. We know that such a large force cannot ever get together and launch such a major operation against a major Afghan city without foreign backing. Now, if this foreign backing, as we suspect, came from Pakistan, then, our allies, the U.S., who are now having bases here, who have a bilateral security agreement with Afghanistan, in which there's a clear reference to helping and defending Afghanistan if there's a foreign aggression against Afghanistan, that has to be then looked at and explained – both by the U.S. and by Afghans as well. Therefore, we need to explain to the Afghan people the fact of the matter.
In her third question, Shevardnadze pointed to the increasing attacks of Taliban and the fall of northern Kunduz city.
When asked about Afghan National Security and Defense Forces, Karzaid said: The Afghan forces are, no doubt, heroic, no doubt they fight very well, no doubt they are trying to defend their country, but the Afghan forces are not properly equipped, they don't have the right weaponry and right elements needed, as far as the military training and all of that is concerned to provide a good defence of the country. But, even with a very strong force, if there's continued foreign intervention, and that intervention is left unanswered for years, you're doomed to get into situation like we are in Afghanistan. This has been one of my major issues with the U.S., with other allies: first, the training of the Afghan forces, the proper equipping of the Afghan forces, and then, addressing the question of sanctuaries beyond Afghanistan. As long as that continues, we will continue to suffer, meaning: the sanctuaries abroad, and the helping from abroad – as long as that continues, we will suffer.
Shevardnadze asked Karzai on whether he believes on peace talk with Taliban.
Shevardnadze went on to ask Karzai about America's policy in Afghanistan.
He said: Absolutely. Peace is imperative, the talks are imperative. Those Taliban, who are Afghans, who belong to this country, are requested to come back to Afghanistan and free themselves from foreign use, from foreign exploitation, and come back to their own country and rebuild this country along with other countrymen. There's no other way. I hope, sense will prevail in them, I hope patriotism will prevail in them and they will participate in rebuilding of this country and bringing peace in this country.
He said: The double policy, for me, when I said it, meant that the U.S., on the one hand, said that terrorism did not emanate from Afghanistan that these sanctuaries were beyond Afghanistan. Admiral Mullen, then a U.S. Military Chief of Staff, said in a statement some years ago that one of the Afghan groups, the Haqqani network was a proven arm of the ISI. If that was the case, then how come they provided support to the ISI as well and to the Pakistani military as well? So it was this that caused… and other facts that were available to us, that we have heard from Americans time and again, that make us suspicious. You cannot be helping the victim and the perpetrator of an atrocity in the same time. If they are with us, fighting against terrorism, they should not be with those who are supporting terrorism. (KP)
(12) Joint Special ...
who were officers of the contingent, were appreciated and praised by Special Envoy to President Ahmad Zia Massoud. The contingent by recapturing Kunduz city and fighting terrorists has been able to beat enemies of the people in the city; therefore, they were appreciated by Special Envoy to President. Afghan National Security Forces (ANSF) by giving lots of sacrifices have been able to recapture Kunduz city and killed a large of number of the enemies. (BNA)
(13) Taliban Hid ...
bombing," Kate Stegeman, MSF's communications director in Afghanistan, said Monday: The group said no staff had reported a Taliban flag on any wall of the compound.
(14) Signs of ...
MSF has acknowledged that it treated wounded Taliban fighters at the Kunduz hospital, but it insists no weapons were allowed in. Afghans who worked there have told the AP that no one was firing from within. (Agencies)
justice, tranquillity and education," Dost stated. "He used to impose unjust penalties, closed educational institutions, maltreated people and indulged in such actions that cannot be justified," the report published by The Express Tribune further states.
Mawlawi Abdul Rahim Muslim Dost, a former U.S. prisoner kept at Guantanamo Bay detention center, was with Hizb-i-Islami and Taliban before joining Daesh. (KP)
"He is doing all this in the name of Islam and has EARNED a bad name for Da'ish. Therefore, I consider it as an Islamic obligation to withdraw allegiance to Saeed," the report adds.
(15) 5 Associates...
lah S/O Khalid and Samiullah alias Khanjar original residents of Kundoz province.
NDS statements usually do not contain exact date of the achievements but they come after recent activities. (KP)
The press release further states that the arrested group was killing imminent figures, planting landmines and torching schools.
(16) US F-16 ...
no injuries and safely returned to base."
The photographs were first shared on Twitter late on Tuesday night, indicating two 'drop-tanks' and airto-ground missile with two other bombs.
The F-16 fighter jet was flying over Syed Karam district when it came under the enemy fire with photographs shared on social media purportedly showing a group of insurgents standing near the fuel tanks and munitions of the aircraft.
The Taliban group claimed a fighter jet was shot down by the group's fighters but the coalition forces rejected the report as baseless.
It also followed a day after an air-
The incident took place a day after a NATO helicopter crashed in capital Kabul leaving five personnel of the Resolute Support mission dead.
craft of the Afghan National Army of Afghanistan. (KP)
crashed in central Bamyan province
(17) Europe's ...
president said, adding that "the request for asylum and getting it is more respected in Africa since some three million refugees have found safety and protection that they had lost in their countries."
"We should also welcome economic migrants, it is a challenge that can be solved in a win-win arrangement between Europe and Africa," he concluded.(Xinhua)
The co-president of the Alliance for Liberals and Democrats for Europe, Pacific, Africa and the Caribbean (ALDE PAC) Louis Michel said "Europe should fulfil its moral obligation to humanity by welcoming refugees running away from war and violence."
(18) US Still...
"I don't have any specific expectations other than to try and move things forward and that will depend on conversations themselves," said Kerry, who said the United States was "not seeking a new change or outsiders to come in."
(19) Kerry Says ...
Kerry's visit to Spain follows a recent visit by Spanish King Felipe VI and his wife Queen Letizia to Washington DC, and an agreement signed between the two countries to increase the U.S. military base at Moron de la Frontera in the south of Spain.(Xinhua)
maintaining the status quo at the compound, which has long been under Muslim religious administration while Jews are permitted to visit the site but not pray there.
Israel has deployed troops in and around Jerusalem and erected roadblocks in Palestinian neighborhoods in East Jerusalem to try and stop the most serious outbreak of Palestinian street attacks since an uprising in 2000-2005.(Reuters)
"We are not seeking a new change or outsiders to come in, I don't think Israel or Jordan wants that and we're not proposing it," he said. "What we need is clarity."
(20) Britain...
enough is being done to counter extremism.
Cameron called on the Muslim community to do more to combat the threat. (AFP)
A 15-year old boy, thought to be Britain's youngest person convicted of terrorism, was sentenced earlier this month to a minimum of five years in jail for plotting an IS-inspired "massacre" on an Anzac Day parade in Australia.
(21) Turkish ...
on Sept. 30, said the drone was not its asset.
Turkey joined the U.S.-led air raids on Islamic State in July, and the United States is arming the PYD in its battle against the IS. (Xinhua)
Davutoglu said that the downing of the drone had a "deterrent" effect and that he hoped Russia would show a "more careful" stance after earlier incursions.
(22) French...
Hollande and German Chancellor Angela Merkel.
(23) 1 Suicide ...
There has been an uptick in the number of near-miss type incidents involving NATO and Russian military aircraft since the Ukraine conflict caused a surge in tensions.(Reuters)
the report said. It said the suspects were about to join IS in Syria and Iraq
Turkey has stepped up anti-terror operations across the country following the Ankara bombings. (Xinhua)
in a short time period.
(24) Nuclear ...
suspected was aimed at developing a nuclear bomb. Iran denies this charge.
(25) China to...
In July Iran also agreed to reduce its stockpile of low-enriched uranium (LEU) to 300 kg of 3.67-percent fissile purification for 15 years. Weapons grade uranium must be enriched to around 90 percent fissile purity.(Reuters)
northern Pacific Ocean."
(26) Tajikistan's ... with his or her own (often commercial) private activities, and in some instances may not even be a citizen of the sending country. Such consular appointments are usually given the title of honorary consul.(Asia-Plus)
Established in 1992, PICES is an intergovernmental scientific organization aiming to promote and coordinate marine research in the northern North Pacific and adjacent seas. Its present members include China, the United States, Canada, Japan, Republic of Korea and Russia. (Xinhua)
|
<urn:uuid:12697425-b468-42cd-8cba-619f43dbe54c>
|
CC-MAIN-2021-43
|
http://outlookafghanistan.net/assets/epaper/October%2020,%202015/See%20Back%20Page.pdf
|
2021-10-25T09:42:51+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00173-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 60,483,239
| 5,190
|
eng_Latn
|
eng_Latn
| 0.999529
|
eng_Latn
| 0.999529
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
25397
] |
## ASX Investment Products
**AUSTRALIA'S HOME OF LISTED INVESTMENTS**
Listed Managed Investments, mFunds and ETPs
### Investment Product Summary - September 2021
**Transaction days: 21 / Period ending: Thursday, 30 September 2021**
| ASX Fund Segment | ETPs | mFund | LICs | AREITs | Infrastructure |
|------------------|------|-------|------|--------|----------------|
| Market Capitalisation | $122.95 bn | $1860.32 m | $59.75 bn | $163.57 bn | $92.37 bn |
| Number Listed | 227 | 242 | 102 | 48 | 7 |
| No. Transactions/Day | 25,363 | 112 | 8,330 | 139,084 | 38,528 |
| Avg. Daily Volume | 23,171,174 | 2,582,852 | 27,675,999 | 167,926,943 | 53,882,718 |
| Avg. Daily Value | $459,656,171 | $3,766,247 | $60,087,215 | $652,525,196 | $330,730,620 |
### Recent Admissions
| Product Name | ASX Code | Type | Admission Date | Last Price |
|--------------|----------|------|----------------|-----------|
| Touch Ventures Limited | TVL | LIC | 29 September 2021 | $.49 |
| Janus Henderson Global Sustainable (Managed Fund) | FUTR | MF | 22 September 2021 | $29.94 |
| Healthco Healthcare and Wellness REIT | HCW | AREIT | 6 September 2021 | $2.21 |
| Magellan High Conviction Trust | MHHT | MF | 31 August 2021 | $1.77 |
| ETFS Semiconductor ETF | SEMI | ETF | 31 August 2021 | $9.74 |
| Milford Aus Absolute Growth Fund (Au) (Class R) | MFAO4 | mFund | 6 August 2021 | $1.27 |
| VanEck Bentham GL Cap Se Active ETF (Managed Fund) | GCAP | MF | 5 August 2021 | $10.03 |
| Firetrail Australian Small Companies Fund (CI A) | FTR03 | mFund | 1 July 2021 | $1.54 |
| WAM Strategic Value Limited | WAR | LIC | 28 June 2021 | $1.25 |
| Orbis Global Equity Le Fund (Australia Registered) | ORB03 | mFund | 17 June 2021 | $1.07 |
| Salter Brothers Emerging Companies Limited | SB2 | LIC | 16 June 2021 | $.80 |
| Monash Absolute Active Trust (Hedge Fund) | MAAT | ETF | 10 June 2021 | $1.07 |
### Snapshot by Asset Class
| ASX Fund Asset Class | No. | Market Cap | Transactions /day | Avg. Daily Volume | Avg. Daily Value |
|----------------------|-----|------------|-------------------|-------------------|-----------------|
| Equity - Australia | 167 | $71,126,020,524 | 12,303 | 20,317,212 | $213,906,230.3 |
| Equity - Global | 219 | $78,884,511,130 | 15,908 | 22,986,252 | $184,115,827.6 |
| Infrastructure | 21 | $94,296,070,484 | 38,819 | 54,609,944 | $335,279,509.8 |
| Fixed Income - Australia | 73 | $12,305,015,621 | 1,396 | 3,993,444 | $34,852,787.6 |
| Fixed Income - Global | 48 | $6,237,772,912 | 825 | 3,359,078 | $15,329,675.5 |
| Mixed | 40 | $2,982,718,595 | 1,370 | 396,588 | $13,646,226.6 |
| Property - Australia | 55 | $165,976,007,350 | 137,482 | 167,100,101 | $657,942,111.1 |
| Property - Global | 15 | $1,926,485,163 | 2,462 | 1,282,733 | $7,392,049.6 |
| Commodity | 8 | $3,511,137,570 | 656 | 457,521 | $11,254,609.3 |
| Currency | 5 | $197,865,861 | 48 | 124,438 | $1,529,685.7 |
| Cash | 3 | $3,190,995,445 | 153 | 615,057 | $31,822,264.8 |
| **TOTAL** | 654 | **$440,634,600,654.97** | **211,422** | **275,242,370** | **$1,507,070,977.9** |
## Investment Product Trends
### MONTH-ON-MONTH & YEAR-ON-YEAR COMPARISON
#### Investment Product Summary - September 2021
| ETPs | Last 12 months | Last month |
|------|----------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | % change |
| Market Cap ($bn) | 71.12 | 122.95 | 72.9% | 122.78 | 0.1% |
| Number admitted (actual) | 216 | 227 | 5.1% | 226 | 0.4% |
| 12 month avg transactions | 356,297 | 401,605 | 12.7% | 388,532 | 3.4% |
| 12 month avg value ($b) | 7.63 | 7.58 | -0.5% | 7.44 | 2.0% |
[more info](https://www2.asx.com.au/investors/learn-about-our-investment-solutions/etfs-and-other-etps)
| mFunds | Last 12 months | Last month |
|--------|----------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | % change |
| Market Cap ($m) | 1,209.56 | 1,860.32 | 53.8% | 1,842.18 | 1.0% |
| Number admitted (actual) | 239 | 242 | 1.3% | 242 | 0.0% |
| 12 month avg transactions | 2,378 | 3,269 | 37.4% | 3,221 | 1.5% |
| 12 month avg value ($m) | 58.86 | 94.21 | 60.1% | 92.34 | 2.0% |
[more info](http://www.mfund.com.au)
| LICs & LITs | Last 12 months | Last month |
|-------------|----------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | % change |
| Market Cap ($bn) | 46.80 | 59.75 | 27.7% | 59.79 | -0.1% |
| Number listed (actual) | 110 | 102 | -7.3% | 101 | 1.0% |
| 12 month avg transactions | 120,535 | 121,617 | 0.9% | 114,878 | 5.9% |
| 12 month avg value ($b) | 0.82 | 0.89 | 8.6% | 0.84 | 5.8% |
[more info](https://www2.asx.com.au/investors/learn-about-our-investment-solutions/lics-and-lits)
| A-REITs | Last 12 months | Last month |
|---------|----------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | % change |
| Market Cap ($bn) | 127.4 | 163.6 | 28.4% | 165.0 | -0.9% |
| Number listed (actual) | 49 | 48 | -2.0% | 47 | 2.1% |
| 12 month avg transactions | 2,816,809 | 2,205,829 | -21.7% | 2,162,537 | 2.0% |
| 12 month avg value ($b) | 12.3 | 9.5 | -22.4% | 9.4 | 1.4% |
[more info](https://www2.asx.com.au/investors/learn-about-our-investment-solutions/a-reits)
| Infrastructure Funds | Last 12 months | Last month |
|----------------------|----------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | % change |
| Market Cap ($bn) | 84.04 | 92.37 | 9.9% | 90.41 | 2.2% |
| Number listed (actual) | 8 | 7 | -12.5% | 7 | 0.0% |
| 12 month avg transactions | 1,111,454 | 800,020 | -28.0% | 811,136 | -1.4% |
| 12 month avg value ($b) | 5.90 | 4.60 | -22.0% | 4.55 | 1.3% |
[more info](https://www2.asx.com.au/markets/trade-our-cash-market/asx-investment-products-directory/infrastructure-funds)
| TOTAL ASX Funds | Last 12 months | Last month |
|-----------------|----------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | % change |
| Market Cap ($b) | 330.59 | 440.51 | 33.2% | 439.82 | 0.2% |
| Number admitted (actual) | 622 | 626 | 0.6% | 623 | 0.5% |
| 12 month avg transactions | 4,407,473 | 3,532,340 | -19.3% | 3,480,305 | 1.5% |
| 12 month avg value ($b) | 26.67 | 22.69 | -14.9% | 22.30 | 1.7% |
[more info](https://www2.asx.com.au/)
### Annualised Liquidity
| Product | Annualised Liquidity |
|---------------|----------------------|
| ETPs | 74.00% |
| mFunds | 60.77% |
| LICs & LITs | 17.84% |
| A-REITs | 69.82% |
| Infrastructure Funds | 59.81% |
---
**Contact Information:**
- **Andrew Campion**
- Head of Investment Products
- +61 2 9227 0237
- [email protected]
- **Andrew Weaver**
- Senior Manager, Investment Product Specialists
- +61 2 9227 0275
- [email protected]
- **Rory Cunningham**
- Senior Manager, Investment Products
- +61 2 9227 0171
- [email protected]
- **Martin Dinh**
- Senior Investment Product Specialist
- +61 2 9227 0218
- [email protected]
- **Anastasia Anagnostakos**
- Business Development Manager
- +61 2 9227 0869
- [email protected]
- **Fabiana Candiano**
- Investment Product Specialist
- +61 2 9227 0862
- [email protected]
- **Roger Daniel**
- Investment Product Specialist
- +61 2 9227 0279
- [email protected]
- **Helen Chong**
- Business Development Manager
- +61 2 9227 0628
- [email protected]
## Investment Product Trends
### MONTH-ON-MONTH & YEAR-ON-YEAR COMPARISON
#### Investment Product Summary - September 2021
| ETPs | Last 12 months ($bn) | Last month |
|---------------|-----------------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | %change |
| Equity - Australia | 21.41 | 32.52 | 51.9% | 32.37 | 0.5% |
| Equity - Global | 28.65 | 62.70 | 118.9% | 63.30 | -0.9% |
| Fixed Income | 12.32 | 15.46 | 25.5% | 14.89 | 3.8% |
| Property | 3.88 | 5.77 | 49.0% | 5.81 | -0.6% |
| Commodities | 3.55 | 3.51 | -1.2% | 3.59 | -2.2% |
| Currency | 0.27 | 0.20 | -26.6% | 0.19 | 4.4% |
| Mixed | 1.25 | 2.91 | 133.0% | 2.76 | 5.2% |
[more info](www.asx.com.au/etf-and-other-etp.htm)
#### Transaction days: 21 / Period ending: Thursday, 30 September 2021
| mFunds | Last 12 months ($m) | Last month |
|--------------|---------------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | %change |
| Equity - Australia | 276.36 | 495.87 | 79.4% | 489.72 | 1.3% |
| Equity - Global | 306.95 | 398.19 | 29.7% | 402.06 | -1.0% |
| Fixed Income | 484.23 | 787.55 | 62.6% | 773.50 | 1.8% |
| Property | 74.47 | 105.14 | 41.2% | 103.55 | 1.5% |
| Mixed | 67.54 | 73.56 | 8.9% | 73.36 | 0.3% |
[more info](www.mfund.com.au)
#### LICs & LITs
| LICs & LITs | Last 12 months | Last month |
|-------------|----------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | %change |
| Equity - Australia | 28.63 | 38.11 | 33.1% | 38.63 | -1.4% |
| Equity - Global | 13.11 | 15.78 | 20.4% | 15.40 | 2.5% |
| Fixed Income | 4.76 | 5.48 | 15.3% | 5.37 | 2.2% |
| Property | 0.31 | 0.38 | 22.5% | 0.39 | -3.5% |
[more info](www.asx.com.au/lics)
#### A-REITs
| A-REITs | Last 12 months | Last month |
|--------------|----------------|------------|
| | Sep-20 | Sep-21 | % change | Aug-21 | %change |
| Diversified | 21.80 | 28.33 | 30.0% | 28.47 | -0.5% |
| Industrial | 41.08 | 48.30 | 17.6% | 50.50 | -4.4% |
| Miscellaneous| 16.93 | 21.60 | 27.5% | 22.15 | -2.5% |
| Residential | 4.08 | 5.37 | 31.8% | 5.40 | -0.5% |
| Retail | 31.79 | 43.58 | 37.1% | 42.14 | 3.4% |
| Specialised | 9.87 | 11.82 | 19.7% | 11.99 | -1.5% |
[more info](www.asx.com.au/areits)
## ETP Summary - September 2021
**Transaction days:** 21 / **Period ending:** Thursday, 30 September 2021
### ETPs Market Growth
- **Number listed**: 270
- **Market capitalisation, billions**: $140 billion
### ETP Market Activity
- **Number of transactions, thousands**: 9
- **Value traded, billions**: $8 billion
- **12 month rolling average**: $7 billion
### Asset Spread of ETPs, FUM
- **Equity - Australia**: $32,525 m
- **Equity - Global**: $62,704 m
- **Infrastructure**: $1,527 m
- **Fixed Income - Global**: $2,988 m
- **Cash**: $3,191 m
- **Property - Australia**: $3,631 m
- **Property - Global**: $615 m
- **Commodity**: $5,511 m
- **Currency**: $198 m
- **Mixed**: $2,909 m
### Funds Flow by Asset Class (ths)
- **Equity - Australia**: $945,622
- **Equity - Global**: $865,498
- **Infrastructure**: $45,134
- **Fixed Income - Australia**: $193,153
- **Fixed Income - Global**: $130,365
- **Cash**: $382,752
- **Property - Australia**: $36,968
- **Property - Global**: $20,248
- **Commodity**: $30,099
- **Currency**: $6,214
- **Mixed**: $193,210
### Issuer
| Issuer | Products | FUM ($m) | FUM Change ($ths) | Funds Flow ($ths) | Value Traded ($ths) | Transactions |
|-------------------------|----------|------------|-------------------|-------------------|---------------------|--------------|
| BetaShares | 59 | $19,956.3 | $735,139.9 | $1,054,751.6 | $2,937,145 | 155,655 |
| ETF Securities | 18 | $4,179.8 | $5,753.6 | $127,246.0 | $385,067 | 29,745 |
| Fidante | 1 | $845.2 | $35,676.6 | $38,491.7 | $52,240 | 2,369 |
| Fidelity | 1 | $224.0 | -$78,289.5 | -$67,880.8 | $101,033 | 1,303 |
| Hyperion / Pinnacle | 1 | $2,005.2 | $50,094.9 | $100,658.7 | $48,175 | 2,619 |
| InvestSMART | 3 | $214.9 | $4,477.8 | $1,956.8 | $4,705 | 595 |
| iShares | 36 | $23,352.9 | $139,070.1 | $588,572.1 | $2,020,991 | 89,524 |
| Janus Henderson | 1 | $0.3 | $295.7 | $295.7 | $215 | 12 |
| K2 | 2 | $25.0 | $746.4 | $988.4 | $1,897 | 152 |
| Legg Mason / BetaShares | 4 | $385.0 | $76,119.3 | $78,946.8 | $96,604 | 1,409 |
| Loftus Peak / EQT | 1 | $217.0 | -$4,197.5 | $7,978.1 | $2,688 | 175 |
| Magellan | 5 | $16,390.6 | -$741,324.8 | -$244,475.1 | $201,125 | 6,957 |
| Monash / Trust Company | 1 | $30.0 | -$1,047.0 | -$533.4.9 | $2,142 | 184 |
| Montaka / Perpetual | 2 | $129.0 | -$2,564.6 | -$568.6 | $1,885 | 154 |
| Morningstar | 1 | $157.1 | -$1,207.5 | $1,836.0 | $6,755 | 507 |
| Munro / GSFM | 1 | $155.7 | $13,206.4 | $18,377.5 | $21,596 | 613 |
| Perennial | 2 | $60.6 | $3,313.7 | $3,873.3 | $5,616 | 1,073 |
| Antipodes / Pinnacle | 1 | $27.8 | $596.7 | $314.7 | $551 | 32 |
| Russell Investments | 5 | $967.9 | -$24,778.2 | -$8,421.2 | $67,185 | 1,698 |
| Schroder | 1 | $58.5 | $2,937.1 | $3,081.7 | $4,295 | 127 |
| StateStreet | 17 | $8,166.0 | -$233,194.8 | $60,316.6 | $530,988 | 33,097 |
| Switzer | 2 | $398.8 | $4,320.1 | $12,247.1 | $20,025 | 963 |
| The Perth Mint | 1 | $563.9 | -$13,124.7 | $4,557.0 | $26,579 | 1,685 |
| Platinum | 2 | $507.6 | -$4,221.0 | -$4,641.0 | $21,729 | 1,101 |
| VanEck | 29 | $8,761.5 | -$26,996.1 | $208,761.0 | $655,847 | 31,796 |
| Vanguard | 30 | $35,172.8 | $236,043.2 | $868,085.3 | $2,435,701 | 169,081 |
| XTB / EQT | 28 | $128.6 | -$6,705.5 | -$5,631.9 | $6,416 | 109 |
**Total**: 255, $123,082.0, $170,140.3, $2,849,262.6, $9,659,195.7, 532,735
mFund Summary - September 2021
Transaction days: 21 / Period ending: Thursday, 30 September 2021
mFunds Market Growth
Number Listed
Market Capitalisation, Millions
Top 5 mFunds by Value Transacted
- JHI02 - Janus Henderson Tactical Income Fund, $5.93 m
- PMF03 - PIMCO Global Bond Fund Wholesale Class, $4.43 m
- PMF02 - PIMCO Diversified Fixed Interest Fund Wholesale Class, $4.38 m
- RAI03 - ClearBridge RARE Infrastructure Income Fund - Hedged (Class A), $3.24 m
- BAE03 - Bennelong ex-20 Australian Equities, $2.37 m
Value Transacted by Asset
- Equity - Australia, $496 m
- Equity - Global, $398 m
- Infrastructure, $41 m
- Fixed Income - Australia, $179 m
- Fixed Income - Global, $608 m
- Mixed, $74 m
Valued Transacted by Fund Manager
- PIMCO, $13.9 m
- Janus Henderson, $6.75 m
- Macquarie, $5.79 m
- Bennelong, $5.31 m
- Fidelity, $4.54 m
- Schroders, $4.28 m
- Clearbridge, $3.58 m
- UBS, $2.92 m
- Ausbli, $2.15 m
- Hyperion, $1.89 m
This chart isn't available in your version of Excel.
Editing this shape or saving this workbook into a different file format will permanently break the chart.
Spotlight: Listed Investment Entities
LICs & LITs Summary - September 2021
Transaction days: 21 / Period ending: Thursday, 30 September 2021
LIC Market Growth
- Number Listed
- Market Capitalisation, billions
LICs Premium / Discount to NTA as at 31 August 2021
Asset Spread of LICs
Top 5 LICs by Value Traded
Value Traded by Asset
- MLT - Milton Corporation Limited, $254.83 m
- AFI - Australian Foundation Investment Company Limited, $84.51 m
- ARG - Argo Investments Limited, $73.61 m
- MGF - Magellan Global Fund - Closed Class Units, $72.75 m
- WAM - WAM Capital Limited, $53.08 m
- Equity - Australia - $38.11 bn
- Equity - Global - $15.78 bn
- Infrastructure - $0.36 bn
- Fixed Income - Australia - $2.84 bn
- Fixed Income - Global - $2.64 bn
- Property - Global - $0.02 bn
- Equity - Australia - $728.33 m
- Equity - Global - $360.37 m
- Infrastructure - $3.59 m
- Fixed Income - Australia - $91.85 m
- Fixed Income - Global - $77.36 m
- Property - Global - $3.3 m
| Fund Manager | Products | FUM ($m) | FUM Change ($ths) | Net Funds Flow ($ths) | Value Transacted ($ths) | # Transactions |
|---------------------------|----------|-----------|-------------------|-----------------------|-------------------------|----------------|
| Aberdeen | 9 | $27,791 | -$566.6 | -$25.8 | $590 | 22 |
| Allan Gray | 3 | $38,661 | $1,432.6 | $401.6 | $1,700 | 35 |
| Alpha | 7 | $0.468 | -$5.8 | $0.0 | $0 | - |
| Alphinity | 3 | $9,757 | $70.6 | $240.8 | $1,013 | 20 |
| Altrinsic | 1 | $0.400 | -$8.1 | $0.0 | $0 | - |
| Alexander | 1 | $0.248 | $0.6 | $0.0 | $0 | - |
| AMP Capital | 5 | $17,094 | -$553.5 | -$254.6 | $551 | 59 |
| Antares | 1 | $0.252 | $0.4 | $0.0 | $0 | - |
| Antipodes | 2 | $25,913 | -$221.2 | -$57.4 | $1,135 | 27 |
| APN | 2 | $22,647 | -$758.9 | -$238.9 | $1,129 | 264 |
| Aoris | 2 | $1,979 | $481.3 | $549.2 | $575 | 8 |
| Armytage | 2 | $5,526 | -$170.5 | -$8.9 | $98 | 2 |
| Atlas | 1 | $3,004 | $109.6 | $98.9 | $109 | 3 |
| Ausbil | 12 | $35,557 | $1,132.6 | $1,694.0 | $2,154 | 73 |
| Australian Ethical | 8 | $32,567 | $581.8 | $842.3 | $1,127 | 35 |
| 4D Infrastructure | 1 | $4,184 | -$146.7 | -$37.9 | $141 | 5 |
| Bell | 2 | $25,336 | $37.9 | $1,234.7 | $1,290 | 18 |
| Bennelong | 5 | $135,317 | $2,596 | $3,210.7 | $5,313 | 170 |
| Bentham | 4 | $57,221 | $810.3 | $672.7 | $1,127 | 84 |
| Brandywine | 2 | $4,018 | $3.9 | $60.0 | $98 | 3 |
| Claremont | 2 | $4,644 | $111.9 | $214.0 | $252 | 8 |
| Clearbridge | 4 | $33,508 | $2,495.4 | $3,281.5 | $3,578 | 159 |
| Coolabah | 2 | $24,329 | $377.7 | $340.1 | $1,025 | 21 |
| Cooper | 3 | $7,178 | -$49.4 | $215.4 | $370 | 6 |
| Copper Rock | 1 | $0.137 | -$6.8 | -$0.0 | $0 | - |
| Dalton Street | 1 | $0.554 | $5.7 | $0.0 | $0 | - |
| EFG Asset Management | 1 | $0.000 | $0.0 | $0.0 | $0 | - |
| Epoch | 2 | $11,046 | $414.8 | $728.1 | $746 | 11 |
| Equity Trustees | 1 | $0.183 | -$2.3 | $0.0 | $0 | - |
| Fairlight | 2 | $1,688 | $0.0 | $0.0 | $303 | 10 |
| Fairview | 1 | $9,244 | $320.3 | $580.3 | $635 | 21 |
| Fidelity | 13 | $153,304 | -$3,198.8 | $238.7 | $4,539 | 103 |
| Firetrail | 3 | $12,707 | $734.0 | $579.7 | $761 | 23 |
| Flinders | 1 | $2,652 | -$37.9 | $14.7 | $15 | 1 |
| Greencape | 1 | $3,140 | -$7.8 | $58.3 | $113 | 8 |
| Janus Henderson | 6 | $67,772 | $5,079.6 | $4,907.8 | $6,747 | 87 |
| Hyperion | 2 | $37,399 | -$22.6 | $850.9 | $1,889 | 46 |
| Insight | 1 | $0.040 | -$0.7 | $0.0 | $0 | - |
| Insync | 1 | $14,553 | -$851.8 | $8.0 | $128 | 5 |
| Intermede | 1 | $6,075 | -$7.9 | $205.2 | $309 | 8 |
| Invesco | 7 | $8,974 | $91.2 | $124.2 | $441 | 11 |
| Fund Name | # of Funds | Total Value | Total Fees | Total Returns | Total Profits | Total Units |
|-------------------------|------------|-------------|------------|---------------|---------------|-------------|
| ipac | 1 | $0.759 | $2.5 | $9.9 | $10 | 1 |
| JBS | 1 | $0.000 | $0.0 | $0.0 | $0 | - |
| JP Morgan | 5 | $13.565 | $282.3 | $377.2 | $531 | 11 |
| Kapstream | 1 | $39.003 | $149.2 | $145.9 | $1,122 | 28 |
| Lakehouse | 1 | $13.489 | -$453.0 | $308.9 | $353 | 14 |
| LaSalle | 2 | $0.442 | $2.9 | $19.7 | $20 | 1 |
| Martin Currie | 11 | $23.310 | $128.1 | $37.3 | $594 | 14 |
| Macquarie | 12 | $114.653 | $2,487.8 | $4,227.3 | $5,794 | 221 |
| Merlon | 1 | $7.737 | $48.0 | -$44.2 | $50 | 15 |
| Milford | 4 | $0.359 | $29.3 | $32.3 | $30 | 1 |
| MLC | 3 | $5.859 | $146.0 | $214.4 | $215 | 4 |
| Morningstar | 8 | $15.973 | -$50.6 | -$6.4 | $351 | 12 |
| Nanuk Asset Management | 1 | $18.630 | -$551.8 | $286.5 | $936 | 21 |
| Munro Partners | 1 | $26.027 | -$1,774.6 | -$620.6 | $791 | 21 |
| Orbis | 3 | $32.636 | -$208.1 | $324.0 | $1,042 | 26 |
| Payden | 1 | $2.540 | -$144.8 | -$148.6 | $143 | 2 |
| Phoenix Portfolio | 1 | $1.041 | $39.2 | $0.0 | $0 | - |
| PIMCO | 9 | $414.290 | $2,565.8 | $6,277.2 | $13,903 | 229 |
| Platinum | 1 | $22.045 | -$234.0 | -$71.0 | $580 | 23 |
| Plato | 2 | $21.021 | $623.0 | $978.0 | $1,208 | 22 |
| PM Capital | 2 | $3.468 | $230.6 | $230.1 | $361 | 7 |
| Presima | 1 | $0.108 | -$5.6 | $0.0 | $0 | - |
| QS Investors | 1 | $0.029 | $29.3 | $29.3 | $30 | 1 |
| Quay | 1 | $5.298 | $162.8 | $401.2 | $415 | 10 |
| Realm | 2 | $28.142 | $1,245.2 | $1,304.1 | $1,151 | 34 |
| Schroders | 10 | $81.232 | $1,455.4 | $2,446.8 | $4,281 | 94 |
| SG Hiscock | 7 | $45.474 | $279.5 | $447.4 | $1,054 | 32 |
| Spectrum | 1 | $8.440 | $443.1 | $437.8 | $565 | 12 |
| Spheria | 3 | $5.024 | -$40.5 | -$64.6 | $30 | 1 |
| UBS | 12 | $47.067 | $761.5 | $1,605.6 | $2,923 | 95 |
| Western Asset | 4 | $15.592 | -$26.8 | $220.3 | $608 | 33 |
| **Total** | **242** | **$1,860.316** | **$17,892.877** | **$40,133.887** | **$79,091** | **2,341** |
Spotlight: Australian Real Estate Investment Trusts (AREITs)
A-REITS Summary - September 2021
Transaction days: 21 / Period ending: Thursday, 30 September 2021
A-REIT Market Growth
Number Listed
Market Capitalisation, billions
A-REIT Market Activity
Number of Transactions x100,000
Value Traded, billions
Value Traded by Asset, Current Period $m
Diversified 17.82%
Industrial 30.38%
Miscellaneous 13.58%
Residential 3.38%
Retail 27.41%
Specialised 7.43%
Top 5 A-REITs by Value Traded, Current Period $m
GMG - Goodman Group $2,287.12
SYD - Sydney Airport $2,121.23
TCL - Transurban Group $1,955.56
SCG - Scentre Group $1,503.03
MGR - Mirvac Group $1,099.91
Infrastructure Funds Summary - September 2021
Transaction days: 21 / Period ending: Thursday, 30 September 2021
**Infrastructure Funds Market Growth**
- Number Listed
- Market Capitalisation, billions
**Infrastructure Funds Market Activity**
- Number of Transactions, x100,000
- Value Traded, billions
**Top 5 Infrastructure Funds by Value Traded**
- APA - APA Group $826.31
- AST - AusNet Services Limited $551.87
- CMW - Cromwell Property Group $212.52
- TOT - 360 Capital REIT $7.35
- WOT - Wotso Property $45
**Asset Spread of Infrastructure Funds**
- Airport Services 24.11%
- Electric Utilities 15.83%
- Gas Utilities 11.16%
- Highways & Railtracks 48.90%
## IRESS Watchlist: /ETFASX
### Exchange Traded Product Summary - September 2021
#### Activity
| ASX Code | Type | Fund Name | MER (% p.a.) | FUM ($m)# | Funds inflow/ outflow ($m) ** | Transacted Value ($) | Transacted Volume | Number of Trades | Monthly Liquidity % | % Spread* | Bid Depth (A$'000s)** | Ask Depth (A$'000s)** |
|----------|------|------------------------------------------------|--------------|-----------|-------------------------------|----------------------|------------------|-------------------|---------------------|-----------|------------------------|------------------------|
| GDX | ETF | VanEck Gold Miners ETF | 0.53 | 397.67 | -34.09 | 2.43 | 20,298,572 | 475,003 | 1,748 | 5.10% | $634.41 | $658.94 |
| HACK | ETF | Betashares Global Cybersecurity ETF | 0.67 | 667.40 | -1.78 | 26.21 | 47,315,152 | 4,586,284 | 7,876 | 7.09% | $1,067.44 | $848.76 |
| HLTH | ETF | VanEck Global Healthcare Leaders ETF | 0.45 | 66.26 | 1.36 | 4.91 | 8,211,563 | 646,171 | 578 | 12.39% | $1,446.51 | $1,194.61 |
| IXI | ETF | Shares Global Consumer Staples ETF | 0.47 | 140.41 | 0.71 | 2.02 | 7,207,246 | 85,414 | 784 | 5.13% | $704.15 | $745.09 |
| IXJ | ETF | Shares Global Healthcare ETF | 0.47 | 1,030.79 | -12.56 | 16.64 | 39,859,083 | 335,324 | 6,505 | 3.87% | $1,088.87 | $1,061.20 |
| MNRS | ETF | Betashares Global Gold Miners ETF - Currency Hedged | 0.57 | 48.26 | -15.14 | -8.56 | 3,694,384 | 645,009 | 470 | 7.66% | $153.78 | $254.70 |
| RBTZ | ETF | Betashares Global Robotics and Artificial Intelligence ETF | 0.57 | 204.83 | 15.53 | 12.44 | 19,740,772 | 1,240,254 | 2,948 | 9.64% | $1,199.04 | $386.60 |
| ROBO | ETF | ETF5 ROBO Global Robotics and Automation ETF | 0.69 | 262.05 | 4.18 | 8.56 | 15,038,319 | 170,192 | 1,674 | 5.74% | $527.02 | $533.71 |
| SEMI | ETF | ETF5 Semiconductor ETF | 0.57 | 36.04 | 27.45 | 27.76 | 36,297,779 | 3,620,710 | 4,447 | 100.72% | $1,596.73 | $1,253.93 |
| TECH | ETF | ETF5 Morningstar Global Technology ETF | 0.45 | 353.11 | 8.98 | 11.98 | 19,466,518 | 194,382 | 1,853 | 5.51% | $1,411.72 | $1,472.81 |
#### Prices
| ASX Code | Type | Fund Name | Last | Year High | Year Low | Historical Distribution Yield | 1 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|------|------------------------------------------------|------|-----------|----------|--------------------------------|----------------------|----------------------|---------------------------|-----------------------------|
| GDX | ETF | VanEck Gold Miners ETF | 0.53%| -8.50% | -26.14% | 17.12% | 3.32% |
| HACK | ETF | Betashares Global Cybersecurity ETF | 2.92%| -4.18% | 40.74% | 20.61% | 21.90% |
| HLTH | ETF | VanEck Global Healthcare Leaders ETF | 0.33%| 5.47% | 19.90% | n/a | n/a |
| IXI | ETF | Shares Global Consumer Staples ETF | 2.03%| -0.94% | 12.20% | 8.73% | 7.87% |
| IXJ | ETF | Shares Global Healthcare ETF | 1.02%| 2.86% | 19.43% | 11.88% | 14.08% |
| MNRS | ETF | Betashares Global Gold Miners ETF - Currency Hedged | 3.61%| -10.55% | -23.72% | 23.32% | 3.83% |
| RBTZ | ETF | Betashares Global Robotics and Artificial Intelligence ETF | 2.92%| 1.63% | 32.30% | 18.21% | n/a |
| ROBO | ETF | ETF5 ROBO Global Robotics and Automation ETF | 9.12%| 1.64% | 35.87% | 16.32% | n/a |
| SEMI | ETF | ETF5 Semiconductor ETF | 0.00%| -3.56% | n/a | n/a | n/a |
| TECH | ETF | ETF5 Morningstar Global Technology ETF | 14.46%| -0.76% | 33.96% | 23.80% | n/a |
#### Returns
| ASX Code | Type | Fund Name | 1 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|------|------------------------------------------------|----------------------|----------------------|---------------------------|-----------------------------|
| ADEF | MF | Apostle Dundas Global Equity Fund - Class D Units (Managed Fund) | 0.20% | 2.64% | n/a | n/a |
| AGX1 | MF | Antipodes Global Shares (Quoted Managed Fund) | 0.52% | 27.10% | n/a | n/a |
| BBUS | MF | Betashares US Equities Strong Bear Currency Hedged (Hedge Fund) | 0.00% | 8.02% | -53.24% | 38.03% |
| ERTH | ETF | Betashares Climate Change Innovation ETF | 0.07% | 6.19% | n/a | n/a |
| ETHI | ETF | Betashares Global Sustainability Leaders ETF | 5.36% | 2.40% | 31.50% | 23.33% |
| FIUTR | MF | Janus Henderson Global Sustainable Active ETF (Managed Fund) | 0.00% | -0.63% | n/a | n/a |
| GGUS | MF | Betashares Guard US Equity Fund Currency Hedged (Hedge Fund) | 3.00% | 7.30% | 86.51% | 22.95% |
| GOAT | ETF | VanEck Morningstar International Wide Moat ETF | 0.88% | 2.60% | 25.25% | n/a |
| HETH | ETF | Betashares Global Sustainability Leaders ETF - Currency Hedged | 5.90% | 3.52% | 32.40% | n/a |
| HLQT | ETF | Betashares Global Quality Leaders ETF - Currency Hedged | 5.36% | 5.04% | 26.30% | n/a |
| HYGG | MF | Hyperion Global Growth Companies Fund (Managed Fund) | 0.00% | 2.59% | n/a | n/a |
| INCM | ETF | Betashares Global Income Leaders ETF | 1.27% | 26.35% | 2.57% | n/a |
| LNAS | MF | ETF5 Ultra Long Nasdaq 100 Hedge Fund | 58.11% | -11.59% | 81.01% | n/a |
| LPGD | MF | Loftus Peak Global Disruption Fund (Managed Fund) | 0.00% | -5.50% | n/a | n/a |
| MAET | MF | Muroa Global Growth Fund (Hedge Fund) | 9.23% | 3.63% | n/a | n/a |
| MGOC | MF | Magellan Global Fund - Open Class Units (Managed Fund) | 1.88% | 2.86% | n/a | n/a |
| MHG | MF | Magellan Global Equities Fund Currency Hedged (Managed Fund) | 3.55% | -4.07% | 10.04% | 9.28% |
| MHHT | MF | Magellan High Conviction Trust (Managed Fund) | 0.00% | 3.02% | n/a | n/a |
| MKAX | MF | Montaka Global Extension Fund (Quoted Managed Fund) | 4.62% | 2.27% | 18.23% | n/a |
| MOAT | ETF | VanEck Morningstar Wide Moat ETF | 0.97% | 1.28% | 38.46% | 18.61% |
| MOGL | MF | Montgomery Global Equities Fund (Managed Fund) | 4.08% | -1.00% | 25.82% | 8.70% |
| MSTR | MF | Morningstar International Shares Active ETF (Managed Fund) | 2.03% | 26.90% | n/a | n/a |
| PAXX | MF | Platinum Asia Fund (Quoted Managed Hedge Fund) | 18.47% | 0.21% | 9.18% | 11.89% |
| QHAL | ETF | VanEck MSCI World Australia Quality (Hedged) ETF | 0.93% | 5.70% | 28.50% | n/a |
| QLTY | ETF | Betashares Global Quality Leaders ETF | 4.64% | -3.75% | 25.13% | n/a |
| QMIX | ETF | SPDR MSCI World Quality Mix Fund | 3.00% | 2.74% | 26.62% | 12.27% |
| QSMI | ETF | VanEck MSCI International Small Companies Quality ETF | 0.22% | 2.97% | n/a | n/a |
| QUAL | ETF | VanEck MSCI International Quality ETF | 0.93% | -4.23% | 27.67% | 18.20% |
| SNAS | MF | ETF5 Ultra Short Nasdaq 100 Hedge Fund | 0.00% | 12.82% | -54.64% | n/a |
| UMAX | MF | BetaShares S&P 500 Yield Maximiser Fund (Managed Fund) | 5.49% | -0.51% | 27.01% | 7.73% |
| VESG | ETF | Vanguard Ethically Conscious International Shares Index ETF | 1.03% | -2.10% | 29.21% | 15.42% |
| VGMF | MF | Vanguard Global Multi-Factor Active ETF (Managed Fund) | 1.25% | 0.02% | 37.33% | n/a |
| VISM | ETF | Vanguard MSCI International Small Companies index ETF | 4.97% | -0.58% | 41.07% | n/a |
| VMIN | MF | Vanguard Global Minimum Volatility Active ETF (Managed Fund) | 14.04% | -2.45% | 12.98% | 5.63% |
| VWLU | MF | Vanguard Global Value Equity Active ETF (Managed Fund) | 1.15% | 2.08% | 58.64% | 6.81% |
| WCMQ | MF | WCM Quality Global Growth Fund (Quoted Managed Fund) | 2.75% | 0.00% | 30.05% | 3.86% |
| WDIV | ETF | SPDR S&P Global Dividend Fund | 2.71% | -2.52% | 26.96% | 21.32% |
| WDMF | ETF | Betashares Edge MSCI World Multifactor ETF | 5.56% | -5.09% | 28.34% | 9.12% |
| WQCL | ETF | Betashares MSCI World Minimum Volatility ETF | 1.84% | -2.42% | 15.50% | 8.24% |
| VUEE | ETF | VanEck MSCI International Value ETF | 0.44% | 1.53% | n/a | n/a |
| ZIUS | ETF | ETPS S&P 500 High Yield Low Volatility ETF | 2.77% | 0.18% | 35.39% | 5.50% |
## mFund Product Summary - September 2021
### IRESS Watchlist: /MFUND
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| ACA01 | mfund | AMP Capital Australian Equity Income | 0.720% | 1.208 | -0.010 | 0.005 | 4,661 | 4,283 | 18 | 1.0856 | -0.87% | 1.87% | 38.98% | 9.21% |
| ACY01 | mfund | Armitage Australian Equity Income Fund | 1.430% | 3.925 | -0.130 | 0.000 | - | - | - | 0.8269 | -1.42% | 2.55% | 30.76% | 7.23% |
| ACY02 | mfund | Armitage Strategic Opportunities Fund (Wholesale) | 1.780% | 1.601 | -0.041 | -0.009 | 98,380 | 145,149 | 2 | 0.6605 | -0.37% | 4.81% | 36.15% | 9.41% |
| AET04 | mfund | Australian Ethical Australian Shares Wholesale | 1.100% | 4.762 | -0.020 | 0.030 | 30,100 | 9,383 | 3 | 3.1588 | -1.04% | 6.32% | 39.11% | 18.32% |
| AXW07 | mfund | Ausbil Australian Concentrated Equity Fund | 0.750% | 0.119 | 0.022 | 0.024 | 25,000 | 16,856 | 1 | 1.4393 | -1.98% | 4.15% | 39.24% | n/a |
| AXW08 | mfund | Ausbil Active Sustainable Equity Fund | 1.000% | 0.263 | -0.003 | 0.000 | - | - | - | 1.5284 | -1.20% | 6.90% | 35.98% | n/a |
| AFZ19 | mfund | Aberdeen Ex-20 Australian Equities Fund | 0.950% | 1.481 | -0.153 | -0.145 | 187,029 | 34,665 | 3 | 5.3068 | -0.50% | 3.92% | 20.12% | 9.41% |
| ALH01 | mfund | Alphinity Wholesale Australian Share Fund | 0.900% | 0.922 | -0.013 | 0.000 | - | - | - | 3.8949 | -1.37% | 2.62% | 31.21% | 9.79% |
| ALH02 | mfund | Alphinity Wholesale Concentrated Australian Share Fund | 0.800% | 3.287 | -0.358 | -0.293 | 294,639 | 177,860 | 4 | 1.6479 | -1.79% | 1.94% | 29.19% | 8.90% |
| ALH03 | mfund | Alphinity Wholesale Socially Responsible Share Fund | 0.950% | 5.549 | 0.442 | 0.534 | 718,263 | 305,822 | 16 | 2.3105 | -1.81% | 2.74% | 32.72% | 13.03% |
| AQY01 | mfund | Allian Gray Australia Equity Fund | 0.770% | 32.548 | 1.363 | 0.404 | 1,689,562 | 1,042,691 | 34 | 1.6552 | 3.08% | 5.54% | 40.60% | 4.70% |
| AXW01 | mfund | Ausbil Australian Active Equity | 0.900% | 5.539 | 0.117 | 0.210 | 408,519 | 92,632 | 8 | 4.3426 | -1.70% | 4.49% | 40.83% | 11.87% |
| AXW04 | mfund | Ausbil Australian Geared Equity | 2.270% | 5.280 | -0.028 | 0.163 | 164,890 | 138,442 | 7 | 1.1807 | -3.60% | 8.73% | 96.07% | 14.83% |
| AXW05 | mfund | Ausbil 130/30 Focus Fund | 1.000% | 8.676 | -0.067 | 0.097 | 300,841 | 148,837 | 10 | 2.0001 | -1.87% | 1.05% | 28.14% | 10.05% |
| AXW06 | mfund | Ausbil Active Dividend Income Fund | 0.850% | 5.809 | 0.004 | 0.142 | 142,574 | 128,246 | 13 | 1.1034 | -0.54% | 2.89% | 30.74% | 11.22% |
| BAE01 | mfund | Bennelong Australian Equities | 0.950% | 33.268 | 1.576 | 1.512 | 1,871,445 | 558,418 | 68 | 3.3250 | 0.20% | 9.93% | 43.76% | 21.22% |
| BAE02 | mfund | Bennelong Concentrated Australian Equity | 0.850% | 29.072 | -0.226 | 0.144 | 696,594 | 217,786 | 19 | 3.1560 | -1.26% | 8.89% | 40.06% | 17.24% |
| BAE03 | mfund | Bennelong ex-20 Australian Equities | 0.950% | 63.549 | 0.748 | 1.334 | 2,370,050 | 686,627 | 65 | 3.3989 | -0.93% | 9.43% | 45.05% | 19.03% |
| BAE04 | mfund | Bennelong Twenty20 Australian Equities | 0.390% | 1.793 | 0.088 | 0.103 | 105,000 | 57,577 | 3 | 1.7966 | -0.92% | 5.00% | 42.37% | 16.23% |
| EQY01 | mfund | Eqt Wholesale Flagship Fund | 0.720% | 0.183 | -0.002 | 0.000 | - | - | - | 1.4253 | -0.20% | 4.07% | 33.51% | 9.96% |
| FIL08 | mfund | Fidelity Australian Equities | 0.850% | 45.295 | -0.750 | 0.006 | 1,514,109 | 36,578 | 33 | 41.0589 | -1.64% | 5.20% | 37.68% | 11.99% |
| FIL21 | mfund | Fidelity Australian Opportunities | 0.850% | 4.929 | -0.069 | -0.021 | 55,000 | 2,605 | 2 | 21.0815 | -0.97% | 2.21% | 28.91% | 9.87% |
| FIL26 | mfund | Fidelity Future Leaders | 1.200% | 29.513 | -1.105 | -0.305 | 464,805 | 16,625 | 13 | 27.2887 | -2.61% | 6.19% | 22.81% | 12.47% |
| FTR01 | mfund | Firetrail Absolute Return Fund (Class A Units)| 1.500% | 11.147 | 0.715 | 0.541 | 685,062 | 547,812 | 21 | 1.2502 | 1.67% | 2.36% | 7.14% | 6.97% |
| FTR02 | mfund | Firetrail Australian High Conviction Fund (Class A Units) | 0.900% | 1.422 | 0.018 | 0.038 | 76,286 | 60,486 | 2 | 1.2400 | -1.49% | 3.22% | 37.90% | 7.95% |
| GCC01 | mfund | Greencape Broadcap Fund | 0.950% | 3.140 | -0.008 | 0.058 | 113,000 | 61,284 | 8 | 1.8192 | -2.10% | 1.61% | 26.77% | 12.09% |
| HYN01 | mfund | Hyperion Australian Growth Companies | 0.950% | 30.261 | -0.673 | 0.070 | 973,966 | 196,080 | 23 | 4.8230 | -2.40% | 8.64% | 39.93% | 22.36% |
| IAL11 | mfund | Invesco Wholesale Australian Share Fund | 0.440% | 0.262 | 0.024 | 0.029 | 70,586 | 54,843 | 2 | 1.2552 | -1.94% | 0.03% | 28.17% | 9.31% |
**Transaction days:** 21
**Period ending:** Thursday, 30 September 2021
## mFund Product Summary - September 2021
### IRESS Watchlist: /MFUND
| ASX Code | Type* | Fund Name | Activity | Prices | Returns |
|----------|-------|------------------------------------------------|----------|--------|---------|
| | | | MER (% p.a) | FUM ($m) | Funds Inflow / Outflow ($m) | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
| IAL16 | mFund | Invesco Australian equity Efficient income Fund - Class A | n/a | 0.000 | 0.000 | - | - | - | 0.8287 | -2.59% | 0.24% | 12.52% | n/a | n/a |
| IWM03 | mFund | Alpha Australian Blue Chip Fund | n/a | 0.125 | -0.001 | 0.000 | - | - | 0.7943 | n/a | n/a | n/a | n/a | n/a |
| LMA01 | mFund | Martin Currie Equity Income Fund [Class A] | 0.850% | 1.330 | 0.000 | 0.000 | - | - | 1.3365 | 0.00% | 3.28% | 30.73% | 6.87% | 6.71% |
| LMA11 | mFund | Martin Currie Sustainable Equity Fund [Class A]| 0.770% | 0.000 | 0.000 | 0.000 | - | - | 2.9291 | -0.75% | 2.70% | 33.30% | 6.77% | 9.07% |
| LMA13 | mFund | Martin Currie Ethical Income Fund [Class A] | 0.850% | 0.065 | 0.030 | 30,000 | 26,655 | 1 | 1.1243 | 0.80% | 4.02% | 36.84% | 7.85% | n/a |
| LMA14 | mFund | Martin Currie Ethical Values with Income Fund [Class A] | 0.850% | 0.042 | 0.000 | 0.000 | - | - | 1.2177 | 0.80% | 4.05% | 36.87% | 7.90% | 7.03% |
| LMA17 | mFund | Martin Currie Select Opportunities Fund [Class A]| 0.500% | 0.000 | 0.000 | 0.000 | - | - | 1.3566 | 2.38% | 5.35% | 41.40% | 6.26% | 9.93% |
| MLO02 | mFund | Merlon Wholesale Aus Share Income Fund | 0.950% | 7.737 | 0.048 | -0.044 | 50,315 | 45,682 | 15 | 1.1142 | 1.58% | 4.46% | 24.61% | 4.89% | 5.02% |
| PLU01 | mFund | Plato Australian Shares Income | 0.900% | 20.277 | 0.656 | 0.976 | 1,205,588| 902,024 | 18 | 1.3280 | -1.63% | 0.94% | 25.08% | 7.36% | 8.21% |
| SCH21 | mFund | Schroder Wholesale Australian Equity | 0.800% | 8.551 | 0.092 | 0.154 | 489,494 | 326,282 | 12 | 1.4923 | -0.74% | 2.86% | 33.24% | 7.69% | 9.94% |
| SCH22 | mFund | Schroder Equity Opportunities Wholesale | 0.800% | 0.736 | -0.024 | -0.022 | - | - | - | 1.1839 | -0.15% | 3.92% | 32.99% | 6.40% | 8.63% |
| SHF01 | mFund | SGH 20 | 0.900% | 1.018 | 0.002 | 0.015 | 15,000 | 8,657 | 1 | 1.7078 | -1.30% | 3.26% | 23.16% | 7.36% | 9.79% |
| SHF02 | mFund | SGH ICE | 1.180% | 33.140 | 0.316 | 0.391 | 802,754 | 294,984 | 21 | 2.7028 | -0.23% | 8.26% | 40.45% | 13.67% | 11.51% |
| SHF07 | mFund | SGH Australia Plus Fund | 0.700% | 1.310 | -0.049 | -0.024 | 23,478 | 14,342 | 1 | 1.6504 | -1.84% | 1.49% | 19.15% | 7.62% | 10.36% |
### Equity - Australia Small/Mid Cap
| ASX Code | Type* | Fund Name | Activity | Prices | Returns |
|----------|-------|------------------------------------------------|----------|--------|---------|
| AET07 | mFund | Australian Ethical Emerging Companies Wholesale | 1.200% | 12.475 | 0.735 | 0.597 | 769,642 | 331,016 | 20 | 2.3173 | 1.17% | 9.77% | 40.13% | 28.70% | 20.76% |
| AFZ20 | mFund | Aberdeen Australian Small Companies Fund | 1.260% | 11.841 | -0.157 | -0.021 | 131,862 | 35,179 | 7 | 3.7075 | -1.13% | 2.80% | 20.18% | 11.45% | 9.62% |
| AXW02 | mFund | Ausbil Australian Emerging Leaders Fund | 0.850% | 1.909 | 0.008 | 0.027 | 27,500 | 7,153 | 1 | 3.8148 | -1.00% | 8.41% | 46.67% | 11.83% | 11.78% |
| AXW13 | mFund | Ausbil Australian SmallCap Fund | 1.100% | 1.845 | 0.436 | 0.440 | 444,370 | 225,729 | 16 | 1.9512 | -0.34% | 11.95% | 58.48% | n/a | n/a |
| BAE05 | mFund | Bennelong Emerging Companies Fund | 1.200% | 7.635 | 0.411 | 0.117 | 270,382 | 107,829 | 15 | 2.5337 | 4.06% | 12.84% | 46.52% | 27.99% | n/a |
| CFM02 | mFund | Cromwell Phoenix Opportunities | 0.150% | 1.041 | 0.039 | 0.000 | - | - | - | 2.7873 | n/a | 7.42% | 32.86% | 17.74% | 18.13% |
| FEC01 | mFund | Flinders Emerging Companies B | 1.100% | 2.652 | -0.038 | 0.015 | 14,912 | 8,433 | 1 | 1.7403 | -1.95% | 2.44% | 29.18% | 12.82% | 11.08% |
| FEPO1 | mFund | Fairview Equity Partners Emerging Companies | 1.200% | 9.244 | 0.320 | 0.580 | 635,276 | 264,622 | 21 | 2.3455 | -1.58% | 3.70% | 32.86% | 17.38% | 13.20% |
| FTR03 | mFund | Firetrail Australian Small Companies Fund (Class A Units) | n/a | 0.138 | 0.001 | 0.000 | - | - | - | 1.5447 | 0.97% | 6.78% | 60.08% | n/a | n/a |
| HYN02 | mFund | Hyperion Small Growth Companies | 1.250% | 7.138 | 0.651 | 0.781 | 915,374 | 150,126 | 23 | 5.9865 | 0.43% | 13.04% | 42.82% | 23.40% | 17.72% |
| IAL12 | mFund | Invesco Wholesale Australian Smaller Companies Fund – Class A | 0.550% | 0.047 | -0.001 | 0.000 | - | - | - | 2.8486 | -2.60% | 2.72% | 28.87% | 9.72% | 9.42% |
| IWM07 | mFund | Alpha Australian Small Companies | n/a | 0.059 | -0.001 | 0.000 | - | - | - | 0.9494 | n/a | n/a | n/a | n/a | n/a |
| MFA02 | mFund | Milford Dynamic Fund (AU) | 1.120% | 0.053 | -0.001 | 0.000 | - | - | - | 1.3368 | -1.29% | 5.81% | 33.57% | n/a | n/a |
| SHF04 | mFund | SGH Emerging Companies | 1.030% | 9.094 | 0.037 | 0.084 | 193,797 | 28,157 | 8 | 6.8758 | -0.52% | 1.92% | 37.47% | 23.01% | 16.47% |
| SPM01 | mFund | Spheria Australian Microcap Fund | 1.350% | 1.934 | 0.048 | 0.000 | - | - | - | 1.7427 | 2.55% | 11.33% | 65.65% | 16.69% | 15.11% |
## mFund Product Summary - September 2021
### IRESS Watchlist: /MFUND
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| SPM02 | mFund | Spheria Australian Smaller Companies Fund | 1.100% | 2.992 | -0.089 | -0.065 | 30,000 | 10,139 | 1 | 2.9201 | -0.79% | 5.10% | 45.03% | 12.61% | 12.96% |
| SPM03 | mFund | Spheria Opportunities Fund | 0.990% | 0.098 | 0.000 | 0.000 | - | - | - | 1.3399 | 0.41% | 5.37% | 42.24% | 11.27% | 13.12% |
| UAM01 | mFund | UBS Australian Small Companies Fund | 0.850% | 12.811 | 1.198 | 1.317 | 1,406,751 | 641,714 | 31 | 2.1569 | -1.02% | 6.69% | 37.35% | 16.25% | 13.82% |
| UAM02 | mFund | UBS Microcap Fund | 1.200% | 3.727 | 0.020 | 0.038 | 78,223 | 34,729 | 11 | 2.2194 | -0.48% | 5.72% | 40.32% | 18.14% | 14.99% |
### Equity - Global
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| AET01 | mFund | Australian Ethical High Growth Fund (Wholesale) | 0.900% | 1.972 | 0.030 | 0.064 | 65,000 | 27,650 | 2 | 2.3139 | -1.76% | 4.56% | 35.76% | 13.13% | 12.16% |
| AET03 | mFund | Australian Ethical International Shares Wholesale | 0.590% | 6.143 | -0.075 | 0.112 | 115,000 | 68,085 | 4 | 1.6441 | -3.01% | 4.38% | 31.15% | 13.89% | 13.84% |
| AET05 | mFund | Australian Ethical Diversified Shares Wholesale | 0.950% | 6.162 | -0.086 | 0.026 | 133,539 | 36,061 | 4 | 3.6309 | -1.78% | 4.55% | 35.80% | 13.16% | 12.18% |
| AFZ04 | mFund | Aberdeen International Equity | 0.980% | 0.822 | -0.007 | 0.028 | 20,000 | 30,802 | 1 | 0.6254 | -4.29% | 3.54% | 26.23% | 12.85% | 12.84% |
| AFZ18 | mFund | Aberdeen Actively Hedged International Equities Fund | 0.980% | 1.246 | -0.055 | 0.000 | - | - | - | 4.7059 | -4.24% | 3.95% | 26.72% | 12.87% | 12.76% |
| AFZ30 | mFund | Aberdeen Fully Hedged International Equities | 0.990% | 0.257 | -0.013 | 0.000 | - | - | - | 0.7280 | -4.74% | 0.49% | 27.68% | 11.75% | 11.40% |
| AGA01 | mFund | Altrinsec Global Equities Trust | 0.990% | 0.400 | -0.008 | 0.000 | - | - | - | 1.5869 | -1.98% | 2.85% | 23.57% | 7.00% | 9.40% |
| AGP01 | mFund | Antipodes Global Long Only | 1.200% | 4.923 | -0.165 | -0.103 | 155,529 | 128,459 | 3 | 1.1927 | -1.21% | 1.27% | 26.44% | 7.58% | 12.27% |
| AGP02 | mFund | Antipodes Global Fund | 1.200% | 20.989 | -0.056 | 0.046 | 979,703 | 540,298 | 24 | 1.8022 | -0.49% | 1.40% | 21.51% | 5.53% | 9.40% |
| AOS01 | mFund | Aoris International Fund - Class B | 1.100% | 1.841 | 0.394 | 0.459 | 479,923 | 269,935 | 6 | 1.7010 | -4.50% | 6.69% | 26.01% | 15.67% | n/a |
| AOS02 | mFund | Aoris International Fund - Class D | 1.100% | 0.139 | 0.087 | 0.090 | 95,000 | 66,719 | 2 | 1.3492 | -5.40% | 3.44% | 26.73% | 15.42% | n/a |
| AXW09 | mFund | Ausbil Global SmallCap Fund | 1.200% | 1.477 | 0.220 | 0.268 | 280,311 | 179,397 | 6 | 1.5084 | -3.89% | 5.82% | 41.93% | 11.66% | n/a |
| AXW10 | mFund | Ausbil Global Resources Fund | 1.790% | 4.640 | 0.423 | 0.322 | 360,097 | 180,219 | 11 | 2.0155 | -3.22% | 6.43% | 80.28% | 23.75% | n/a |
| BLL01 | mFund | Bell Global Equities Fund | 0.760% | 12.708 | 0.300 | 0.838 | 865,000 | 489,764 | 4 | 1.7102 | -4.34% | 4.86% | 25.16% | 14.69% | 16.00% |
| BLM01 | mFund | Bell Global Emerging Companies Fund | 1.250% | 12.628 | -0.262 | 0.397 | 425,255 | 275,064 | 14 | 1.4868 | -5.11% | 4.11% | 27.98% | 15.58% | 16.24% |
| COP01 | mFund | Cooper Investors Global Equities Fund (Hedged) | 1.200% | 2.443 | -0.143 | -0.040 | 41,147 | 14,890 | 2 | 2.7071 | -3.97% | 5.41% | 28.30% | 14.26% | 14.48% |
| COP03 | mFund | Cooper Investors Global Equities Fund (Unhedged) | 1.200% | 3.791 | -0.066 | 0.066 | 132,204 | 59,832 | 4 | 2.1434 | -3.41% | 7.81% | 27.56% | 15.49% | 16.13% |
| EAP01 | mFund | Claremont Global Fund (Hedged) | 1.250% | 1.634 | 0.033 | 0.085 | 122,259 | 71,953 | 3 | 1.6552 | -4.48% | 2.46% | 33.82% | 18.19% | 14.90% |
| EAP03 | mFund | Claremont Global Fund | 1.250% | 3.011 | 0.079 | 0.129 | 130,000 | 76,843 | 5 | 1.6746 | -3.36% | 6.41% | 33.30% | 19.75% | 17.02% |
| FIL07 | mFund | Fidelity Global Equities | 0.990% | 19.696 | -0.821 | -0.078 | 342,777 | 8,848 | 7 | 37.6041 | -3.62% | 0.85% | 26.07% | 15.03% | 16.21% |
| FIL14 | mFund | Fidelity Hedged Global Equities | 1.040% | 3.683 | -0.221 | -0.055 | 198,366 | 7,638 | 3 | 25.1282 | -4.24% | -2.42% | 25.87% | 13.21% | 14.28% |
| FIL23 | mFund | Fidelity Global Demographics | 1.150% | 5.766 | -0.079 | 0.096 | 169,575 | 5,842 | 4 | 27.9950 | -3.00% | 5.56% | 25.04% | 15.85% | 16.35% |
| FIL39 | mFund | Fidelity Sustainable Water & Waste Fund | 1.050% | 0.773 | -0.037 | -0.004 | 114,221 | 8,227 | 3 | 13.3467 | -2.61% | 6.35% | 30.26% | n/a | n/a |
| IRESS Watchlist: /MFUND | Activity | Prices | Returns |
|-------------------------|----------|--------|---------|
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m) II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
| FIL43 | mFund | Fidelity Global Future Leaders Fund | 1.100% | 0.423 | 0.077 | 85,000 | 6,360 | 2 | 13.0279 | -1.80% | 3.58% | 33.58% | n/a | n/a |
| FIL76 | mFund | Fidelity Global Emerging Markets | 0.650% | 0.409 | -0.017 | 0.000 | - | - | 11.0440 | -4.00% | 2.71% | 10.87% | 8.63% | n/a |
| FLI01 | mFund | Fairlight Global Small & Mid Cap Fund | 1.250% | 1.420 | 0.250 | 0.291 | 303,000 | 170,636 | 10 | 1.7081 | -3.54% | 6.17% | 30.26% | n/a | n/a |
| FLI02 | mFund | Fairlight Global Small & Mid Cap Fund - Hedged| 1.250% | 0.269 | -0.011 | 0.000 | - | - | 1.4196 | -4.05% | 3.55% | 30.60% | n/a | n/a |
| GSF01 | mFund | Epoch Global Equity Shareholder Yield (Hedged) Fund | 1.300% | 3.068 | -0.100 | 0.010 | 10,000 | 12,447 | 1 | 0.7764 | -3.46% | -1.25% | 21.02% | 4.79% | 5.67% |
| GSF02 | mFund | Epoch Global Equity Shareholder Yield (Unhedged) Fund | 1.250% | 7.978 | 0.515 | 0.718 | 736,000 | 577,845 | 10 | 1.2433 | -2.73% | 1.92% | 21.37% | 5.86% | 7.19% |
| IAL02 | mFund | Invesco Wholesale Global Matrix Fund - unhedged | 0.950% | 1.261 | -0.029 | 0.000 | - | - | 0.6366 | -3.61% | 2.25% | 32.96% | 10.08% | 12.78% |
| IAL08 | mFund | Invesco Wholesale Global Matrix Fund - hedged - Class A | 0.950% | 0.056 | -0.002 | 0.000 | - | - | 0.9607 | -4.42% | -1.38% | 32.87% | 8.59% | 10.94% |
| IBB01 | mFund | Morningstar International Shares (Unhedged) Fund | 0.380% | 3.553 | -0.100 | 0.010 | 10,186 | 9,262 | 1 | 1.0809 | -3.01% | 1.45% | 23.53% | 11.64% | 12.82% |
| IBB04 | mFund | Morningstar International Shares (Hedged) Fund | 0.390% | 1.415 | -0.034 | 0.014 | 15,000 | 28,505 | 1 | 0.5058 | -3.33% | -1.53% | 24.63% | 9.83% | 11.09% |
| INS01 | mFund | Insync Global Capital Aware Fund | 1.300% | 14.553 | -0.852 | 0.008 | 127,761 | 45,849 | 5 | 2.6914 | -5.58% | 0.64% | 13.25% | 17.63% | 16.98% |
| INT01 | mFund | Intermede Global Equities | 0.990% | 6.075 | -0.008 | 0.205 | 309,473 | 151,106 | 8 | 1.9912 | -3.50% | 3.01% | 23.67% | 18.76% | 18.18% |
| IWM06 | mFund | Alpha Global Opportunities Fund | n/a | 0.100 | -0.002 | 0.000 | - | - | 0.8764 | n/a | n/a | n/a | n/a | n/a |
| JHI03 | mFund | Janus Henderson Global Equity Income Fund | 0.850% | 0.052 | -0.001 | 0.000 | - | - | 1.1836 | -2.74% | 1.66% | 19.43% | 4.95% | 7.88% |
| JPM05 | mFund | JPMorgan Global Research Enhanced Index Equity Fund | 0.200% | 0.855 | -0.019 | 0.000 | - | - | 1.6543 | -2.19% | 4.74% | 28.67% | 13.79% | 15.61% |
| LKH01 | mFund | Lakehouse Global Growth Fund | 1.300% | 13.489 | -0.453 | 0.309 | 352,500 | 147,413 | 14 | 2.2732 | -5.46% | 3.18% | 29.67% | 28.42% | n/a |
| LMA15 | mFund | Martin Currie Global Long-Term Unconstrained Fund (Class A) | 0.950% | 0.861 | 0.000 | 0.055 | 119,837 | 70,734 | 4 | 1.6040 | -6.47% | -1.94% | 18.28% | 16.08% | 17.84% |
| LMA18 | mFund | Franklin Global Systematic Equity Fund (Class A) | 0.750% | 0.029 | 0.029 | 0.029 | 30,000 | 15,388 | 1 | 1.9018 | -2.90% | 3.10% | 29.49% | 11.62% | 14.98% |
| JPM06 | mFund | JPMorgan Global Research Enhanced Index Equity Fund (Hedged) | 0.200% | 1.775 | -0.051 | 0.000 | - | - | 1.8065 | -2.79% | 1.64% | 29.79% | 12.61% | 14.05% |
| MPS02 | mFund | Arrowstreet Global Equity Fund | 1.280% | 8.593 | 0.081 | 0.273 | 421,751 | 342,688 | 11 | 1.2040 | -2.25% | 3.39% | 36.33% | 14.62% | 16.68% |
| MPS03 | mFund | IFP Global Franchise Fund | 1.280% | 5.689 | 0.118 | 0.255 | 285,474 | 112,175 | 12 | 2.5007 | -2.45% | 2.56% | 22.79% | 12.45% | 12.26% |
| MPS04 | mFund | Walter Scott Global Equity Fund | 1.280% | 26.019 | -0.548 | 0.480 | 789,887 | 207,755 | 20 | 3.6601 | -3.87% | 4.80% | 23.65% | 13.79% | 16.16% |
| MPS06 | mFund | Walter Scott Global Equity Fund (Hedged) | 1.280% | 4.861 | 0.295 | 0.499 | 757,327 | 633,516 | 11 | 1.1363 | -4.48% | 1.58% | 25.13% | 12.47% | 14.82% |
| MPS07 | mFund | IFP Global Franchise Fund (Hedged) | 1.280% | 0.970 | -0.030 | 0.000 | - | - | 1.6607 | -3.01% | -0.77% | 23.11% | 10.77% | 10.66% |
| MPS08 | mFund | IFP Global Franchise Fund II | 1.280% | 0.309 | 0.043 | 0.048 | 48,258 | 38,977 | 1 | 1.2350 | -1.98% | 3.09% | 21.48% | n/a | n/a |
| MUN01 | mFund | Munro Global Growth Fund | 1.350% | 26.027 | -1.775 | -0.621 | 791,068 | 435,889 | 21 | 1.7435 | -4.15% | 3.31% | 16.33% | 15.66% | 16.88% |
| NUK01 | mFund | Nanuk New World Fund | 1.200% | 18.630 | -0.552 | 0.286 | 936,250 | 495,709 | 21 | 1.8250 | -4.37% | 4.94% | 30.33% | 14.85% | 16.55% |
| NWG01 | mFund | Janus Henderson Global Natural Resources Fund | 1.100% | 8.684 | 0.475 | 0.385 | 383,900 | 253,667 | 6 | 1.5170 | 1.09% | 4.45% | 38.28% | 8.81% | 9.23% |
## mFund Product Summary - September 2021
### IRESS Watchlist: /MFUND
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|---------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| ORB01 | mfund | Orbis Global Equity Australia Registered Retail | 1.000% | 32.563 | -0.208 | 0.324 | 1,041,594 | 6,620 | 26 | 155.5593 | -1.62% | -0.28% | 26.44% | 8.21% | 11.30% |
| ORB02 | mfund | Orbis Global Balanced Fund | 1.000% | 0.072 | 0.000 | - | - | - | - | 121.8862 | -0.13% | 0.76% | 23.74% | 3.70% | n/a |
| ORB03 | mfund | Orbis Global Equity LE Fund | n/a | 0.000 | 0.000 | - | - | - | - | 1.0726 | -1.55% | -0.15% | n/a | n/a | n/a |
| PLI03 | mfund | Plato Global Shares Income A | 0.990% | 0.744 | -0.033 | 0.002 | 2,325 | 2,098 | 4 | 1.0616 | -2.58% | 3.73% | 27.19% | 4.63% | 7.59% |
| SCH31 | mfund | Schroder Global Core Wholesale | 0.300% | 4.079 | -0.096 | 0.047 | 101,898 | 113,513 | 2 | 0.8748 | -3.43% | 3.99% | 27.82% | 11.06% | 13.21% |
| PLM01 | mfund | Platinum Global Fund | 1.350% | 22.045 | -0.234 | -0.071 | 579,525 | 392,325 | 23 | 1.4657 | -0.73% | -0.26% | 32.28% | 9.37% | 11.61% |
| SCH45 | mfund | Schroder Global Recovery Fund - Wholesale | 0.980% | 0.742 | 0.191 | 0.181 | 177,819 | 138,015 | 2 | 1.3217 | 1.83% | 3.60% | 52.79% | 7.01% | n/a |
| SHF08 | mfund | Morgan Stanley Global Quality Fynd | 1.180% | 0.087 | -0.003 | 0.000 | - | - | - | 1.1884 | -3.14% | 3.18% | 16.00% | n/a | n/a |
| SHF09 | mfund | Morgan Stanley Global Sustain Fund | 1.180% | 0.058 | -0.002 | 0.000 | - | - | - | 1.1981 | -3.14% | 4.60% | 15.31% | n/a | n/a |
| STR01 | mfund | Strategic Global Fund | 1.910% | 0.000 | 0.000 | - | - | - | - | 1.0404 | n/a | -7.81% | 17.70% | -1.10% | n/a |
| SPC01 | mfund | Spire Copper Rock Capital Global Smaller Companies | 1.150% | 0.137 | -0.007 | 0.000 | - | - | - | 1.0703 | -4.74% | -3.11% | n/a | n/a | n/a |
### Equity - Asia
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|---------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| AFZ01 | mfund | Aberdeen Asian Opportunities | 1.180% | 1.703 | -0.028 | 0.000 | - | - | - | 1.7062 | -1.61% | -3.83% | 19.30% | 12.98% | 12.07% |
| DSC01 | mfund | Dalton Street Capital Absolute Return Fund | 1.500% | 0.554 | 0.006 | 0.000 | - | - | - | 1.1188 | 1.22% | 0.61% | 32.03% | 2.54% | 2.68% |
| FIL10 | mfund | Fidelity Asia | 1.150% | 24.512 | 0.366 | 0.629 | 1,077,022 | 40,767 | 24 | 26.0064 | -1.09% | -5.13% | 24.53% | 15.24% | 15.94% |
| FIL11 | mfund | Fidelity China | 1.200% | 0.716 | 0.002 | 0.000 | - | - | - | 26.1742 | 0.34% | -2.06% | 9.15% | 1.79% | 8.13% |
| FIL15 | mfund | Fidelity India Fund | 1.200% | 8.819 | 0.071 | 0.113 | 148,155 | 2,817 | 5 | 52.5083 | -0.48% | 15.58% | 51.81% | 18.14% | 15.25% |
| NCE01 | mfund | New Capital China Equity Fund | n/a | 0.000 | 0.000 | - | - | - | - | 1.0032 | n/a | n/a | n/a | n/a | n/a |
| SCH42 | mfund | Schroder Asia Pacific Wholesale | 1.100% | 4.262 | -0.187 | -0.033 | 340,075 | 94,140 | 2 | 3.5313 | -3.45% | -5.10% | 12.10% | 10.69% | 13.69% |
### Equity - Emerging Markets
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|---------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| AFZ03 | mfund | Aberdeen Emerging Opportunities | 1.500% | 7.916 | -0.115 | 0.112 | 250,582 | 119,492 | 8 | 2.0665 | -2.82% | -4.07% | 23.23% | 12.06% | 9.56% |
| COP07 | mfund | Cooper Investors Asian Equities Fund | 1.200% | 0.945 | 0.159 | 0.190 | 197,000 | 173,119 | 4 | 1.0961 | -3.89% | -3.56% | 14.98% | n/a | n/a |
| FIL31 | mfund | Fidelity Global Emerging Markets | 0.990% | 8.769 | -0.617 | -0.227 | 370,073 | 15,354 | 7 | 23.7520 | -4.15% | 0.48% | 26.31% | 17.67% | 16.26% |
| LMA12 | mfund | Martin Currie Emerging Markets Fund | 1.000% | 1.006 | 0.001 | 0.034 | 35,000 | 16,360 | 1 | 2.0488 | -3.20% | -5.49% | 17.40% | 12.61% | 13.97% |
| SCH41 | mfund | Schroder Global Emerging Markets Wholesale | 1.000% | 2.073 | 0.261 | 0.326 | 369,250 | 238,564 | 4 | 1.4914 | -3.59% | -4.60% | 17.99% | 10.03% | 11.93% |
| UAM14 | mfund | UBS Emerging Markets Equity Fund | 1.200% | 1.900 | -0.163 | -0.104 | 103,885 | 84,193 | 4 | 1.2321 | -2.87% | -5.54% | 11.24% | 8.64% | n/a |
### Equity - Infrastructure
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|---------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| ACA03 | mfund | AMP Capital Global Infrastructure Securities Unhedged | 0.800% | 2.979 | -0.036 | -0.043 | 72,514 | 57,352 | 4 | 1.2615 | 0.21% | 2.62% | 21.95% | 9.65% | 8.45% |
| AXW11 | mfund | Ausbil Global Essential Infrastructure - Hedged | 1.000% | 0.000 | 0.000 | - | - | - | - | 1.1130 | -1.18% | 4.98% | n/a | n/a | n/a |
## mFund Product Summary - September 2021
### IRESS Watchlist: /MFUND
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|-----------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| AXW12 | mFund | Ausbil Global Essential Infrastructure Fund - Unhedged | 1.000% | 0.000 | 0.000 | - | - | - | 1,2959 | -1.39% | 6.73% | 17.01% | n/a | n/a |
| IWM02 | mFund | Alpha Infrastructure Fund | n/a | 0.026 | 0.000 | - | - | - | 1,4051 | n/a | n/a | n/a | n/a | n/a |
| RAI01 | mFund | ClearBridge RARE Infrastructure Value Fund - Hedged (Class A) | 1.030% | 12.736 | -0.355 | 0.069 | 88,015 | 81,252 | 1,0477 | -3.24% | 1.70% | 17.94% | 8.17% | 7.08% |
| RAI02 | mFund | ClearBridge RARE Infrastructure Value Fund - Unhedged (Class A) | 0.970% | 10.333 | -0.231 | 0.069 | 248,349 | 183,600 | 1,3211 | -2.84% | 4.16% | 17.29% | 8.89% | 8.47% |
| RAI03 | mFund | ClearBridge RARE Infrastructure Income Fund - Hedged (Class A) | 1.030% | 10.406 | 3.082 | 3.143 | 3,241,500 | 2,165,111 | 1,4765 | -0.84% | 5.19% | 15.86% | 13.72% | 9.91% |
| RAI04 | mFund | ClearBridge RARE Emerging Markets Fund | 1.230% | 0.034 | 0.000 | - | - | - | 1,7729 | -1.05% | 2.56% | 23.55% | 2.39% | 1.72% |
| UAM12 | mFund | UBS Clarion Global Infrastructure Securities Fund | 1.000% | 0.721 | 0.053 | 0.079 | 80,000 | 63,162 | 1,2487 | -3.86% | -0.02% | 17.66% | 8.86% | 8.18% |
### Property - Australia
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|-----------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| AFM01 | mFund | Atlas High Income Property Fund | 0.950% | 3.004 | 0.110 | 0.099 | 109,283 | 54,988 | 1,9788 | 0.37% | 6.01% | 30.51% | 0.71% | n/a |
| APF01 | mFund | APN AREIT Fund | 0.850% | 16.556 | -0.183 | 0.127 | 647,101 | 395,488 | 1,5920 | -1.43% | 4.62% | 28.09% | 4.33% | 4.08% |
| LMA02 | mFund | Martin Currie Real Income Fund (Class A) | 0.850% | 16.485 | 0.196 | 0.021 | 247,677 | 136,189 | 1,8019 | 1.08% | 8.21% | 25.15% | 7.53% | 7.20% |
| LMA16 | mFund | Martin Currie Property Securities Fund (Class A) | 0.770% | 0.030 | 0.000 | - | - | - | 1,3510 | -1.11% | 5.91% | 33.01% | 7.18% | 5.42% |
| SHF03 | mFund | SGIH Property Income Fund | 0.950% | 0.767 | -0.021 | -0.019 | 18,847 | 60,368 | 0.3083 | -0.32% | 4.61% | 33.10% | 3.34% | 3.42% |
| UAM11 | mFund | UBS Property Securities Fund | 0.850% | 5.296 | -0.029 | 0.086 | 381,714 | 242,211 | 1,5341 | -2.16% | 5.19% | 34.13% | 13.46% | 10.24% |
### Property - Global
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|-----------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| 4DI01 | mFund | 4D Global Infrastructure Fund | 0.950% | 4.184 | -0.147 | -0.038 | 140,949 | 90,595 | 1,5331 | -2.51% | 1.14% | 19.92% | 9.15% | 9.40% |
| ACA04 | mFund | AMP Capital Global Property Securities | 0.980% | 4.173 | -0.351 | -0.101 | 123,772 | 92,912 | 1,2850 | -5.52% | 0.44% | 27.83% | 7.54% | 6.22% |
| APF02 | mFund | APN Asian REIT Fund | 0.980% | 6.090 | -0.576 | -0.366 | 481,683 | 264,398 | 1,7885 | -2.72% | 1.17% | 14.92% | 8.71% | 7.68% |
| IBB03 | mFund | Morningstar Global Property Securities (H) Fund | 0.370% | 0.047 | -0.002 | 0.000 | - | - | 1,2409 | -4.35% | 0.08% | 29.98% | 4.32% | 3.82% |
| IWM04 | mFund | Alpha Property Securities Fund | n/a | 0.158 | -0.002 | 0.000 | - | - | 0.4640 | n/a | n/a | n/a | n/a | n/a |
| PRED1 | mFund | Presima Global Property Securities Concentrated | 1.000% | 0.108 | -0.006 | 0.000 | - | - | 0.9329 | -4.96% | -0.58% | 26.07% | 3.47% | 3.32% |
| QGD11 | mFund | Quay Global Real Estate Fund | 0.820% | 5.298 | 0.163 | 0.401 | 415,000 | 271,624 | 1,4771 | -6.64% | 4.58% | 34.14% | 10.90% | 10.33% |
| SHF05 | mFund | SGIH LaSalle Global Listed Property Securities | 0.800% | 0.210 | -0.012 | 0.000 | - | - | 1,5952 | -5.46% | -0.49% | 29.08% | 5.77% | 5.13% |
| SHF06 | mFund | SGIH LaSalle Global Property Rich | 0.700% | 0.231 | 0.015 | 0.020 | 20,000 | 16,534 | 1,1927 | -2.17% | 3.32% | 40.99% | 9.82% | 6.34% |
| UAM10 | mFund | UBS Clarion Global Property Securities Fund | 0.900% | 5.272 | -0.069 | 0.224 | 395,975 | 196,574 | 1,9001 | -5.49% | 1.75% | 33.94% | 9.92% | 6.53% |
### Fixed Income - Australian Dollar
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|-----------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| AET02 | mFund | Australian Ethical Fixed Interest Fund Wholesale | 0.300% | 0.592 | -0.009 | 0.000 | - | - | 1,0914 | -1.54% | 0.27% | -1.86% | 3.72% | 2.55% |
| AET06 | mFund | Australian Ethical Cash Wholesale | 0.200% | 0.044 | 0.014 | 14,000 | 14,268 | 1 | 0.9812 | 0.00% | 0.05% | 0.30% | 1.08% | 1.48% |
| ACA02 | mFund | AMP Capital Corporate Bond | 0.520% | 5.114 | -0.082 | -0.075 | 212,076 | 220,283 | 0.9617 | 0.05% | 0.17% | 2.62% | 2.37% | 2.58% |
## mFund Product Summary - September 2021
### IRESS Watchlist: /MFUND
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| ANT01 | mFund | Antares Income | 0.290% | 0.252 | 0.000 | - | - | - | 1.0019 | 0.16% | 0.06% | 1.76% | 1.75% | 2.08% |
| IWM05 | mFund | Alpha Enhanced Yield Fund | n/a | 0.000 | 0.000 | - | - | - | 0.7963 | n/a | n/a | n/a | n/a | n/a |
| JHI02 | mFund | Janus Henderson Tactical Income Fund | 0.450% | 54.902 | 4.186 | 5,934,305 | 5,608,767 | 67 | 1.0584 | 0.18% | 0.23% | 1.27% | 2.62% | 2.61% |
| JHI05 | mFund | Janus Henderson Australian Fixed Interest Fund | 0.450% | 1.631 | 0.003 | 0.025 | 25,000 | 24,457 | 1.0134 | -1.34% | 0.53% | -0.54% | 4.56% | 3.88% |
| LMA04 | mFund | Western Asset Australian Bond Fund (Class A) | 0.420% | 14.082 | -0.013 | 0.220 | 608,181 | 469,439 | 33 | 1.2811 | -1.48% | 0.29% | -1.20% | 4.30% |
| LMA19 | mFund | Western Asset Conservative Income Fund (Class A) | 0.350% | 0.096 | 0.000 | 0.000 | - | - | 1.0735 | 0.03% | 0.01% | 0.61% | 1.24% | 1.65% |
| MIM03 | mFund | Macquarie Australian Fixed Interest Fund | 0.390% | 8.222 | 0.298 | 0.408 | 197,480 | 185,038 | 7 | 1.0569 | -1.41% | 0.42% | -1.32% | 4.36% |
| PMF04 | mFund | PIMCO Australian Bond Fund Wholesale Class | 0.500% | 20.493 | 0.891 | 1.188 | 1,988,263 | 1,977,815 | 21 | 0.9953 | -1.51% | 0.14% | -0.97% | 2.91% |
| PMF05 | mFund | PIMCO Australian Focus Fund Wholesale Class | 0.500% | 1.620 | 0.054 | 0.068 | 68,500 | 66,665 | 2 | 1.0219 | -0.89% | -0.15% | -0.72% | 2.86% |
| PMF07 | mFund | PIMCO Capital Securities Fund Wholesale Class | 0.940% | 2.997 | 0.116 | 0.119 | 134,067 | 119,916 | 3 | 1.1222 | -0.11% | 1.04% | 11.76% | 7.10% |
| RLM02 | mFund | Realm Cash Plus Fund - mFund Units | 0.39% | 3.704 | 0.586 | 0.590 | 590,063 | 584,104 | 9 | 1.0102 | 0.11% | 0.40% | 2.46% | n/a |
| RLM03 | mFund | Realm High Income Fund - mFund Units | 0.70% | 24.437 | 0.659 | 0.714 | 560,639 | 537,570 | 25 | 1.0425 | 0.07% | 0.79% | 4.23% | n/a |
| SCH55 | mFund | Schroder Absolute Return Income Fund | 0.54% | 13.797 | 0.934 | 0.972 | 1,305,855 | 1,270,637 | 40 | 1.0233 | -0.08% | 0.08% | 2.28% | 3.00% |
| SMP01 | mFund | Smarter Money Fund Assisted Investor Class | 0.660% | 7.737 | 0.115 | 0.104 | 234,965 | 228,046 | 8 | 1.0314 | 0.15% | -0.14% | 1.03% | 1.72% |
| SMF02 | mFund | Smarter Money Higher Income | 0.690% | 16.592 | 0.263 | 0.236 | 790,174 | 798,992 | 13 | 0.9905 | 0.16% | -0.12% | 1.42% | 2.24% |
| UJAM04 | mFund | UBS Australian Bond Fund | 0.450% | 4.667 | -0.082 | -0.011 | 291,007 | 267,856 | 4 | 1.0735 | -1.49% | 0.25% | -1.56% | 3.88% |
### Fixed Income - Global
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| AAF01 | mFund | Alexander Fixed Income Fund | 0.650% | 0.248 | 0.001 | 0.000 | - | - | 1.0416 | 0.24% | 0.63% | 5.39% | n/a | n/a |
| BAM03 | mFund | Bentham Wholesale High Yield | 0.600% | 11.827 | -0.005 | -0.014 | 41,597 | 49,273 | 3 | 0.8415 | 0.02% | 0.88% | 9.27% | 4.79% |
| BAM04 | mFund | Bentham Syndicated Loan Fund | 0.840% | 1.651 | 0.003 | 0.001 | 1,465 | 1,709 | 9 | 0.8577 | 0.36% | 0.89% | 9.03% | 4.12% |
| BAM05 | mFund | Bentham Global Income Fund | 0.770% | 43.743 | 0.812 | 0.685 | 1,083,816 | 1,067,511 | 72 | 1.0140 | 0.51% | 0.62% | 8.33% | 3.30% |
| BAM06 | mFund | Bentham Asset Backed Securities Fund - Class I | 0.350% | 0.000 | 0.000 | 0.000 | - | - | - | 1.0114 | 0.12% | 0.43% | 3.53% | 2.34% |
| GSF08 | mFund | Payden Global Income Opportunities A | 0.700% | 2.540 | -0.145 | -0.149 | 142,679 | 135,481 | 2 | 1.0559 | 0.12% | 0.38% | 4.24% | 2.20% |
| IAL05 | mFund | Invesco Wholesale Senior Secured Income Fund | 0.750% | 3.214 | 0.115 | 0.100 | 100,239 | 84,669 | 2 | 1.1815 | 0.80% | 1.55% | 11.96% | 3.50% |
| IWM01 | mFund | Alpha Diversified Income Fund | n/a | 0.000 | 0.000 | 0.000 | - | - | - | 0.9207 | n/a | n/a | n/a | n/a |
| JH04 | mFund | Janus Henderson Diversified Credit Fund | 0.550% | 1.300 | 0.360 | 0.359 | 360,148 | 336,031 | 11 | 1.0680 | 0.15% | 0.52% | 5.88% | 4.85% |
| JPM01 | mFund | JPMorgan Global Strategic Bond Fund | 0.400% | 7.758 | 0.258 | 0.263 | 385,831 | 378,909 | 7 | 1.0145 | -0.06% | 0.20% | 4.09% | 3.11% |
| JPM02 | mFund | JPMorgan Global Bond Opportunities Fund | 0.500% | 0.260 | 0.059 | 0.060 | 59,800 | 58,507 | 1 | 1.0188 | -0.17% | 0.20% | 5.97% | 4.83% |
| KAP01 | mFund | Kapstream Absolute Return Income Fund | 0.550% | 39.003 | 0.149 | 0.146 | 1,121,615 | 949,405 | 28 | 1.1810 | 0.01% | 0.25% | 1.22% | 1.81% |
## mFund Product Summary - September 2021
### IRESS Watchlist: /MFUND
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| LMA07 | mFund | Brandywine Global Opportunistic Fixed Income Fund [Class A] | 0.700% | 2.938 | -0.029 | 0.020 | 56,750 | 48,193 | 2 | 1.1647 | -1.64% | -2.44% | 5.83% | 4.08% | 3.20% |
| LMA10 | mFund | Brandywine Global Income Optimiser Fund [Class A] | 0.650% | 1.080 | 0.033 | 0.040 | 40,800 | 38,062 | 1 | 1.0614 | -0.69% | -0.06% | 6.51% | 8.07% | n/a |
| LMA20 | mFund | Western Asset Global Bond Fund [Class A] | 0.500% | 0.203 | -0.002 | 0.000 | - | - | - | 1.0535 | -0.95% | -0.01% | 1.59% | 4.90% | n/a |
| LMA21 | mFund | Western Asset Macro Opportunities Bond Fund [Class A] | 1.110% | 1.212 | -0.012 | 0.000 | - | - | - | 1.1353 | -0.99% | 0.69% | 5.18% | 7.46% | 5.41% |
| MFA03 | mFund | Milford Diversified Income Fund (AU) | 0.710% | 0.071 | 0.000 | 0.000 | - | - | - | 1.0569 | -0.52% | 1.43% | 10.13% | n/a | n/a |
| MIM01 | mFund | Macquarie Income Opportunities Fund | 0.49% | 42.868 | 1.405 | 1.457 | 1,998,701 | 2,058,306 | 91 | 0.9676 | -0.13% | 0.38% | 2.38% | 2.42% | 2.55% |
| MIM02 | mFund | Macquarie Dynamic Bond Fund | 0.61% | 6.597 | 0.465 | 0.495 | 631,048 | 615,672 | 10 | 1.0182 | -0.59% | 0.29% | 0.85% | 4.67% | 3.34% |
| SCH51 | mFund | Schroder Fixed Income Wholesale | 0.450% | 22.845 | 0.252 | 0.629 | 836,388 | 700,716 | 15 | 1.1801 | -1.67% | 0.16% | -0.05% | 4.79% | 3.46% |
| SPE01 | mFund | Spectrum Strategic Income | 0.750% | 8.440 | 0.443 | 0.438 | 564,844 | 529,992 | 12 | 1.0637 | 0.05% | 0.34% | 2.60% | 2.70% | 3.41% |
| PMF01 | mFund | PIMCO Global Credit Fund Wholesale Class | 0.610% | 30.947 | 0.306 | 0.595 | 690,186 | 692,523 | 19 | 0.9870 | -0.94% | -0.07% | 1.54% | 4.44% | 3.26% |
| PMF02 | mFund | PIMCO Diversified Fixed Interest Fund Wholesale Class | 0.500% | 74.327 | 1.467 | 2.336 | 4,375,478 | 4,372,528 | 59 | 0.9938 | -1.19% | 0.10% | -0.05% | 4.19% | 3.16% |
| PMF03 | mFund | PIMCO Global Bond Fund Wholesale Class | 0.490% | 217.345 | -0.498 | 1.406 | 4,433,236 | 4,411,222 | 71 | 0.9978 | -0.87% | 0.07% | 0.89% | 4.41% | 3.43% |
| PMF06 | mFund | PIMCO Unconstrained Bond Fund Wholesale Class | 0.950% | 3.037 | -0.101 | -0.095 | 94,468 | 91,806 | 2 | 1.0295 | -0.21% | -0.09% | 3.23% | 3.11% | 3.74% |
| PMF08 | mFund | PIMCO Income Fund Wholesale Class | 0.780% | 62.351 | 0.332 | 0.649 | 2,107,581 | 1,963,957 | 51 | 1.0693 | -0.20% | 0.43% | 7.07% | 4.98% | 4.66% |
| PMF09 | mFund | PIMCO ESG Global Bond Fund Wholesale Class | 0.690% | 1.172 | 0.000 | 0.011 | 11,000 | 10,467 | 1 | 1.0415 | -0.91% | -0.06% | 0.26% | 4.19% | n/a |
| PML01 | mFund | PM Capital Enhanced Yield Fund | 0.550% | 2.952 | 0.251 | 0.250 | 340,622 | 299,813 | 6 | 1.1331 | 0.02% | 0.35% | 3.03% | 2.21% | 3.03% |
| PML02 | mFund | PM Capital Enhanced Yield Fund - Class B | 0.790% | 0.516 | -0.020 | -0.020 | 20,000 | 17,210 | 1 | 1.1621 | 0.01% | 0.39% | 3.80% | 2.50% | n/a |
| UAM05 | mFund | UBS Income Solution Fund | 0.600% | 3.060 | -0.003 | 0.006 | 6,133 | 6,720 | 8 | 0.9087 | -0.12% | 0.13% | 3.20% | 2.56% | 3.22% |
| UAM06 | mFund | UBS Diversified Fixed Income Fund | 0.550% | 5.946 | -0.107 | -0.041 | 130,969 | 152,913 | 3 | 0.8494 | -1.09% | 0.16% | -1.30% | 3.37% | 2.68% |
### Mixed Asset
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-------------------|---------------------------------|----------------------|--------------------|------------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| ACA05 | mFund | AMP Capital Multi-Asset | 0.850% | 3.621 | -0.074 | -0.041 | 137,677 | 121,995 | 3 | 1.1228 | -0.92% | 0.46% | 12.84% | 4.01% | 4.79% |
| ALC01 | mFund | IPAC AMP Capital Income Generator | 0.700% | 0.759 | 0.002 | 0.010 | 10,000 | 8,090 | 1 | 1.2228 | -0.73% | 1.30% | 15.12% | 5.84% | 5.32% |
| AET08 | mFund | Australian Ethical Balanced Fund | 0.850% | 0.417 | -0.006 | 0.000 | 100 | 47 | 1 | 2.0739 | -1.54% | 3.26% | 20.58% | 10.88% | n/a |
| AFZ16 | mFund | Aberdeen Multi-Asset Income Fund | 0.720% | 0.292 | -0.003 | 0.000 | 241 | 225 | 3 | 1.0565 | -0.86% | 1.81% | 16.86% | 5.03% | 4.52% |
| AFZ32 | mFund | Aberdeen Multi-Asset Real Return Fund | 0.840% | 2.232 | -0.036 | 0.000 | - | - | - | 2.0256 | -1.58% | 0.47% | 12.79% | 4.76% | 5.45% |
| AQY02 | mFund | Allian Gray Australia Stable Fund | 0.260% | 5.277 | 0.075 | 0.010 | 10,000 | 8,175 | 1 | 1.2247 | 1.62% | 2.57% | 12.06% | 4.01% | 5.07% |
| AQY03 | mFund | Allian Gray Australia Balanced Fund | 0.760% | 0.836 | -0.006 | -0.012 | - | - | - | 1.2409 | 0.80% | 2.43% | 24.30% | 5.01% | n/a |
| IAL18 | mFund | Invesco Wholesale Global Targeted Returns Fund - Class A | 0.950% | 4.134 | -0.015 | -0.004 | 269,953 | 262,408 | 7 | 1.0232 | -0.55% | 0.35% | 0.37% | 0.27% | 0.77% |
| IBB09 | mFund | Morningstar Conservative Real Return Fund | 0.440% | 0.802 | 0.001 | 0.000 | - | - | - | 0.9941 | 0.07% | 1.14% | 9.65% | 3.08% | 3.51% |
## mFund Product Summary - September 2021
### IRESS Watchlist: /MFUND
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m)† | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|-----------------------------------------------|--------------|-----------|---------------------------------|----------------------|--------------------|-----------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| IBB10 | mFund | Morningstar Balanced Real Return Fund | 0.510% | 3.124 | 0.096 | 0.078 | 122,851 | 128,975 | 2 | 0.9628 | 0.59% | 1.76% | 16.32% | 4.18% |
| IBB11 | mFund | Morningstar Growth Real Return Fund | 0.570% | 2.791 | -0.076 | -0.106 | 119,563 | 120,000 | 5 | 1.0061 | 1.05% | 2.15% | 23.23% | 5.81% |
| IBB12 | mFund | Morningstar High Growth Real Return Fund | 0.630% | 2.870 | 0.063 | 0.021 | 59,671 | 57,442 | 2 | 1.0569 | 1.52% | 2.65% | 32.12% | 6.75% |
| IBB13 | mFund | Morningstar Multi Asset Real Return A | 0.700% | 1.371 | 0.001 | -0.024 | 23,431 | 20,426 | 1 | 1.1681 | 1.84% | 2.48% | 22.16% | 5.16% |
| IIM01 | mFund | Insight Diversified Inflation Plus Fund | 0.900% | 0.040 | -0.001 | 0.000 | - | - | - | 0.9468 | -1.64% | -0.27% | 9.85% | 3.39% |
| JHI06 | mFund | Janus Henderson Global Multi-Strategy Fund | 0.900% | 1.203 | 0.058 | 0.045 | 44,000 | 43,119 | 2 | 1.0369 | 1.12% | 1.66% | 5.04% | n/a |
| JPM10 | mFund | JPMorgan Global Macro Opportunities Fund | 0.700% | 2.918 | 0.035 | 0.055 | 84,983 | 70,070 | 3 | 1.2062 | -0.69% | 0.10% | 10.90% | 7.66% |
| LMA05 | mFund | Martin Currie Diversified Income Fund (Class A) | 0.750% | 2.605 | -0.096 | -0.103 | 161,866 | 145,102 | 3 | 1.1194 | 0.27% | 4.45% | 22.73% | 6.57% |
| LMA06 | mFund | Martin Currie Diversified Growth Fund (Class A) | 0.810% | 0.886 | -0.004 | 0.000 | - | - | - | 1.1322 | -0.43% | 2.75% | 21.14% | 6.42% |
| MIM04 | mFund | Macquarie Multi-Asset Opportunities Fund | 0.700% | 7.117 | 0.325 | 0.406 | 503,948 | 489,673 | 51 | 1.0201 | -0.98% | 1.20% | 8.35% | 8.58% |
| MFA01 | mFund | Milford Australian Absolute Growth Fund (Class R) | 0.900% | 0.197 | -0.007 | -0.005 | - | - | - | 1.2659 | -0.96% | 2.27% | 24.10% | 11.64% |
| MFA04 | mFund | Milford Australian Absolute Growth Fund (Class W) | 1.050% | 0.037 | 0.037 | 0.037 | 30,000 | 29,346 | 1 | 1.2737 | -1.14% | n/a | n/a | n/a |
| MLC01 | mFund | MLC WS Inflation Plus - Conservative Portfolio | 0.650% | 0.095 | 0.000 | 0.000 | - | - | - | 1.0635 | -0.15% | 1.09% | 6.30% | 3.30% |
| MLC02 | mFund | MLC WS Inflation Plus - Moderate Portfolio | 0.850% | 1.281 | -0.004 | 0.005 | 4,970 | 4,492 | 2 | 1.0977 | -0.34% | 1.70% | 8.97% | 4.24% |
| MLC03 | mFund | MLC WS Inflation Plus - Assertive Portfolio | 0.950% | 4.483 | 0.151 | 0.209 | 210,000 | 208,074 | 2 | 1.0066 | -1.35% | 2.03% | 13.89% | 6.23% |
| MPS01 | mFund | Winton Global Alpha Fund | 1.480% | 3.407 | 0.089 | -0.040 | 106,336 | 97,279 | 6 | 1.1145 | 3.20% | 6.46% | 17.35% | -2.59% |
| MPS05 | mFund | Macquarie Professional Services Global Alternatives Fund | 0.970% | 0.000 | -0.054 | -0.055 | 53,663 | 57,926 | 1 | 0.9479 | 1.66% | 4.55% | 3.25% | -1.69% |
| SCH11 | mFund | Schroder Real Return CPI Plus 5% Wholesale | 0.850% | 22.456 | 0.013 | 0.162 | 585,677 | 491,341 | 9 | 1.1825 | -0.66% | 0.85% | 10.03% | 4.72% |
| SCH12 | mFund | Schroder Real Return CPI Plus 3.5% Wholesale | 0.600% | 1.691 | 0.019 | 0.032 | 74,122 | 72,573 | 8 | 1.0130 | -0.52% | 0.79% | 8.45% | 4.54% |
| UJAM07 | mFund | UBS Tactical Beta Fund - Balanced | 0.290% | 2.245 | -0.037 | 0.002 | 28,243 | 25,337 | 2 | 1.1040 | -1.71% | 0.48% | 13.39% | 6.76% |
| UJAM08 | mFund | UBS Tactical Beta Fund - Growth | 0.290% | 1.332 | -0.018 | 0.010 | 20,159 | 15,496 | 3 | 1.2834 | -2.05% | 0.78% | 19.78% | 8.09% |
| UJAM09 | mFund | UBS Tactical Beta Fund - Conservative | 0.290% | 0.091 | -0.001 | 0.000 | - | - | - | 1.0022 | -1.40% | 0.18% | 7.23% | 5.32% |
### Australian Indices
| Index | Description | MER (%) | FUM ($m)† | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|---------|--------------------------------------------------|---------|-----------|---------------------------------|----------------------|--------------------|-----------------------|------------------|---------------------|---------------------|---------------------|-----------------------------|-----------------------------|
| XIOAI | S&P/ASX 200 Accumulation | n/a | n/a | n/a | - | - | - | - | -1.45% | 30.56% | 9.65% | 10.42% | |
| XSOAI | S&P/ASX Small Ords Accumulation | n/a | n/a | n/a | - | - | - | - | -1.18% | 30.41% | 9.43% | 10.18% | |
| XPJAI | S&P/ASX 200 A-REIT Accumulation | n/a | n/a | n/a | - | - | - | - | -1.03% | 29.85% | 8.57% | 7.10% | |
| XIFAI | S&P/ASX Infrastructure Index Accumulation | n/a | n/a | n/a | - | - | - | - | 3.36% | 12.10% | 1.02% | 6.28% | |
| SPBDASXT| S&P/ASX Aust Fixed Intd Ixds Total Return | n/a | n/a | n/a | - | - | - | - | 0.00% | 0.00% | 0.00% | 4.99% | 3.52% |
| SPBDAGVT| S&P/ASX Govt Bond Ixds Total Return | n/a | n/a | n/a | - | - | - | - | 0.00% | 0.00% | 0.00% | 5.21% | 3.51% |
Past Performance is not a reliable indicator of future performance.
*** Funds Inflow / Outflow represent the number of units changed times the end of month closing redemption price.
# mFund Product Summary - September 2021
**Transaction days:** 21 / **Period ending:** Thursday, 30 September 2021
| IRESS Watchlist: /MFUND | Activity | Prices | Returns |
|-------------------------|----------|--------|---------|
| ASX Code | Type* | Fund Name | MER (% p.a.) | FUM ($m) II Change | Funds Inflow / Outflow ($m) *** | Transaction Value ($) | Transaction Volume | Number of Transactions | Last Redemption | 1 Month Total Return | 3 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
| | | | | | | | | | | | | | | |
## Notes:
- The FUM for each mFund is based off the last reported number of units recorded in CHESS multiplied by the closing price on the last Transaction day of the month.
- MER (management expense ratio figures) have been extracted from the relevant PDS or as updated by the issuer of the product.
- Under the Corporations Regulations, management costs do not include transactional or operational costs or certain other fees and costs which may also apply. Such costs may be significant.
- When considering a product or comparing between products you should refer to the relevant PDS(s) for more information on any additional costs associated with each product.
All values are as at Sep-21. Month Total return, 1/3/5 year annualised return data provided by Financial Express.
## IRESS Watchlist: /XIC
| ASX Code | Type* | Fund Name | MER (% p.a.) | Outperf Fee | Mkt Cap ($m) | Mkt Cap ($m) Change | Transacted Value ($) | Transacted Volume | Number of Transactions | Monthly Liquidity % | NTA (pre-tax) at NTA Date | Last | Year High | Year Low | Historical Distribution Yield | 1 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|----------------------------------|--------------|-------------|--------------|---------------------|----------------------|--------------------|------------------------|------------------------|------|-----------|---------|-----------------------------|---------------------|---------------------|------------------------|------------------------|
| **Equity - Infrastructure** | | | | | | | | | | | | | | | | | | |
| AII | Shares| Argo Global Listed Infrastructure Limited | 1.20 | No | 355.91 | -13.81 | 3,586,569 | 1,501,412 | 774 | 0.42% | 8/31/2021 | 2.32 | 2.49 | 1.91 | 3.45% | -1.18% | 19.00% | 11.50% | 9.74% |
| FPP | Units | Fat Prophets Global Property Fund | 1.03 | Yes | 21.18 | 0.00 | 332,300 | 301,618 | 72 | 1.71% | 8/31/2021 | 0.93 | 0.99 | 0.72 | 4.62% | 0.00% | 31.49% | 2.67% | n/a |
| **Fixed Income - Global Dollar** | | | | | | | | | | | | | | | | | | |
| NBI | Units | NB Global Corporate Income Trust | 0.85 | Yes | 856.89 | 0.08 | 17,915,292 | 9,398,168 | 1,905 | 1.10% | 8/31/2021 | 1.92 | 1.95 | 1.78 | 5.14% | 0.43% | 11.56% | 4.29% | n/a |
| KKC | Units | KKR Credit Income Fund | 1.21 | Yes | 839.9 | 33.30 | 27,702,117 | 12,496,330 | 2,690 | 1.49% | 8/31/2021 | 2.27 | 2.34 | 1.97 | 4.63% | 4.59% | 18.47% | n/a | n/a |
| PCI | Units | Perpetual Credit Income Trust | 0.88 | Yes | 426.6 | -9.99 | 13,045,975 | 12,043,716 | 1,784 | 2.82% | 8/31/2021 | 1.07 | 1.10 | 1.01 | 3.42% | -0.02% | 7.55% | n/a | n/a |
| PGG | Units | Partners Group Global Income Fund| 1.54 | No | 518.62 | -2.75 | 18,694,457 | 9,943,467 | 1,077 | 1.92% | 8/31/2021 | 1.89 | 2.00 | 1.69 | 4.73% | -0.17% | 14.63% | n/a | n/a |
| GCI | Units | Gryphon Capital Income Trust | 0.96 | No | 478.83 | 54.21 | 14,631,024 | 7,191,457 | 752 | 1.50% | 8/31/2021 | 2.02 | 2.10 | 1.85 | 4.56% | -1.58% | 12.81% | 5.80% | n/a |
| MOT | Units | Metrics Income Opportunities Trust| 1.03 | Yes | 411.4 | 53.74 | 20,597,569 | 10,006,987 | 1,272 | 2.43% | 8/31/2021 | 2.06 | 2.11 | 1.91 | 6.49% | 0.45% | 15.77% | n/a | n/a |
| MXT | Units | Metrics Master Income Trust | 0.86 | No | 1,508.39 | -14.55 | 46,654,091 | 22,644,790 | 3,331 | 1.50% | 8/31/2021 | 2.05 | 2.12 | 1.97 | 4.17% | -0.66% | 7.98% | 5.53% | n/a |
| QRI | Units | Qualitas Real Estate Income Fund | 1.54 | No | 443.99 | 2.76 | 9,967,940 | 6,024,430 | 872 | 1.36% | 8/31/2021 | 1.66 | 1.68 | 1.47 | 5.81% | 1.06% | 18.31% | n/a | n/a |
### Australian Indices
| Index | Description | MER (%) | Outperf Fee | Mkt Cap ($m) | Mkt Cap ($m) Change | Transacted Value ($) | Transacted Volume | Number of Transactions | Monthly Liquidity % | NTA (pre-tax) at NTA Date | Last | Year High | Year Low | Historical Distribution Yield | 1 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|---------|---------------------------------------------------|---------|-------------|--------------|---------------------|----------------------|--------------------|------------------------|------------------------|----------------------------|------|-----------|---------|-----------------------------|---------------------|---------------------|------------------------|------------------------|
| XJOAI | S&P/ASX 200 Accumulation | n/a | n/a | n/a | n/a | - | - | - | - | n/a | n/a | n/a | n/a | -1.45% | 30.56% | 9.65% | 10.42% | |
| XSDAOI | S&P/ASX Small Ords Accumulation | n/a | n/a | n/a | n/a | - | - | - | - | n/a | n/a | 10,785.33 | 111.17 | 82.03 | -1.18% | 30.41% | 9.43% | 10.18% |
| XPJAI | S&P/ASX 200 A-REIT Accumulation | n/a | n/a | n/a | n/a | - | - | - | - | n/a | n/a | 63,366.38 | 657.54 | 486.21 | -1.03% | 29.85% | 8.57% | 7.10% |
| XIFAI | S&P/ASX Infrastructure Index Accumulation | n/a | n/a | n/a | n/a | - | - | - | - | n/a | n/a | 482.98 | 4.85 | 4.12 | 3.36% | 12.10% | 1.02% | 6.28% |
| SPBDAXKT| S&P/ASX Aust Fixed Int idx Total Return | n/a | n/a | n/a | n/a | - | - | - | - | n/a | n/a | 169.84 | - | - | 0.00% | 0.00% | 4.99% | 3.52% |
| SPBDAGVT| S&P/ASX Govt Bond idx Total Return | n/a | n/a | n/a | n/a | - | - | - | - | n/a | n/a | 169.97 | - | - | 0.00% | 0.00% | 5.21% | 3.51% |
---
a The FUM for each LIC is based off the last reported number of units recorded in CHESS multiplied by the closing price on the last Transaction day of the month. Any updates to the number of units on issue received post the last Transaction day of the month are not picked up until the following month.
All values are as at Sep-21. Month Total return for 1 mth, 6 mth and 1 year, 3 & 5 year annualised return data provided by Bloomberg. Dividends are reinvested. Gross dividends are used in the calculation for returns. Price is used to calculate total returns.
NTA data is provided by Bloomberg. MERs are sourced from the Issuer’s publications.
Past Performance is not a reliable indicator of future performance.
## AREIT Product Summary - September 2021
### ASX A-REIT Profiles
| ASX Code | Type* | Fund Name | Mkt Cap ($m) | Mkt Cap Change ($m) | Mkt Cap Transacted Value ($) | Transacted Volume | Number of Trades | Monthly Liquidity % | Last | Year High | Year Low | Historical Distribution Yield | 1 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|--------------------|--------------|---------------------|------------------------------|-------------------|------------------|---------------------|------|-----------|---------|--------------------------------|---------------------|---------------------|------------------------|------------------------|
| WOT | Units | Wotso Property | 223.2 | -1.63 | 450,565 | 324,589 | 71 | 0.2% | 1.37 | 1.47 | 1.20 | 4.74% | -0.72% | 0.46% | 3.34% | 9.24% |
| AKL | Units | Auckland Real Estate Trust | 66.68 | 2.41 | 16 | 19 | 3 | 0.0% | 0.83 | 0.90 | 0.65 | 0.00% | 3.75% | 7.79% | -6.01% | n/a |
| URF | Units | US Masters Residential Property Fund | 138.58 | -5.94 | 1,263,709 | 3,651,908 | 613 | 0.9% | 0.35 | 0.39 | 0.19 | 0.00% | -4.11% | 75.00% | -38.30% | -26.71% |
| URW | Units | Unibail-Rodamco-Westfield | 1,063.56 | -163.01 | 109,396,828 | 20,200,564 | 48,042 | 10.3% | 5.34 | 6.53 | 2.41 | 0.00% | -12.32% | 120.60% | -23.47% | n/a |
### Australian Indices
| Index | Description | Last | Year High | Year Low | Historical Distribution Yield | 1 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|---------|------------------------------------|--------|-----------|----------|--------------------------------|---------------------|---------------------|------------------------|------------------------|
| XJOAI | S&P/ASX 200 Accumulation | n/a | n/a | - | - | - | - | - | - |
| XSOAI | S&P/ASX Small Ords Accumulation | n/a | n/a | - | - | - | - | - | - |
| XRJAI | S&P/ASX 200 A-REIT Accumulation | n/a | n/a | - | - | - | - | - | - |
| XIFAI | S&P/ASX Infrastructure Index Accumulation | n/a | n/a | - | - | - | - | - | - |
| SPBDASXT| S&P/ASX Aust Fixed Intd Total Return | n/a | n/a | - | - | - | - | - | - |
| SPBDAGVT| S&P/ASX Govt Bond Idx Total Return | n/a | n/a | - | - | - | - | - | - |
# The Market Value for each product is based off the last reported number of units recorded in CHESS multiplied by the closing price on the last Transaction day of the month. Any updates to the number of units on issue received post the last Transaction day of the month are not picked up until the following month.
All values are as at Sep-21. Month Total return, 1/3&5 year annualised return data provided by Bloomberg. Dividends are reinvested. Gross dividends are used in the calculation for returns. Price is used to calculate total returns.
Past Performance is not a reliable indicator of future performance.
## Infrastructure Summary - September 2021
### ASX Infrastructure Fund Profiles
| ASX Code | Type* | Fund Name | Mkt Cap ($m) | Mkt Cap Change ($m) | Mkt Cap Transacted Value ($) | Transacted Volume | Number of Trades | Monthly Liquidity % | Last | Year High | Year Low | Historical Distribution Yield | 1 Month Total Return | 1 Year Total Return | 3 Year Total Return (ann.) | 5 Year Total Return (ann.) |
|----------|-------|----------------------------------|--------------|---------------------|------------------------------|-------------------|------------------|---------------------|------|-----------|---------|--------------------------------|---------------------|---------------------|------------------------|------------------------|
| APA | Stapled | APA Group | 10,288.67 | -542.75 | 826,310,458 | 92,784,812 | 162,506 | 8.0% | 8.72 | 11.15 | 8.35 | 5.85% | -5.01% | -10.94% | 0.80% | 6.08% |
| AST | Shares | AusNet Services Limited | 9,651.51 | 2240.53 | 551,866,199 | 239,770,061 | 109,567 | 5.7% | 2.52 | 2.60 | 1.64 | 3.77% | 30.23% | 42.29% | 23.41% | 16.04% |
| ALX | Stapled | Atlas Ateria | 6,224.03 | -354.84 | 670,954,342 | 99,788,041 | 134,586 | 10.8% | 6.49 | 7.07 | 5.39 | 4.39% | -3.19% | 11.94% | 1.56% | 9.75% |
| GDC | Stapled | Global Data Centre Group | 149.41 | 25.39 | 55,718,107 | 28,657,965 | 1,456 | 37.3% | 1.98 | 2.08 | 1.51 | 0.61% | 4.76% | 16.23% | n/a | n/a |
| SKI | Stapled | Spark Infrastructure Group | 4,948.97 | 0.00 | 763,703,141 | 271,232,494 | 34,319 | 15.4% | 2.82 | 2.93 | 1.99 | 4.52% | 0.00% | 45.64% | 15.08% | 10.95% |
| SYD | Stapled | Sydney Airport | 22,237.29 | 728.65 | 2,121,228,070 | 259,401,432 | 130,403 | 9.5% | 8.24 | 8.41 | 5.45 | 0.00% | 3.39% | 40.61% | 9.66% | 7.56% |
| TCL | Stapled | Transurban Group | 38,871.55 | -137.26 | 1,955,562,699 | 139,902,271 | 236,246 | 5.0% | 14.16| 15.51 | 12.26 | 2.56% | 0.48% | 3.88% | 12.14% | 9.36% |
### Australian Indices
| Index | Description | Value 1 | Value 2 | Value 3 | Value 4 |
|---------|--------------------------------------------------|---------|---------|---------|---------|
| XIOAI | S&P/ASX 200 Accumulation | 84,351.55 | 86,637.92 | 64,337.56 |
| XSOAI | S&P/ASX Small Ords Accumulation | 10,785.33 | 111.17 | 82.03 |
| XPJIAI | S&P/ASX 200 A-REIT Accumulation | 63,366.38 | 657.54 | 486.21 |
| XIFAI | S&P/ASX Infrastructure Index Accumulation | 482.98 | 4.85 | 4.12 |
| SPBDASXT| S&P/ASX Aust Fixed Int Idx Total Return | 169.84 | - | - |
| SPBDAGVT| S&P/ASX Govt Bond Idx Total Return | 169.97 | - | - |
---
# The Market Value for each product is based off the last reported number of units recorded in CHESS multiplied by the closing price on the last Transaction day of the month. Any updates to the number of units on issue received post the last Transaction day of the month are not picked up until the following month.
All values are as at Sep-21. Month Total return, 1/3/5 year annualised return data provided by Bloomberg. Dividends are reinvested. Gross dividends are used in the calculation for returns. Price is used to calculate total returns.
Past Performance is not a reliable indicator of future performance.
---
**Contact Information:**
Andrew Campion
Head of Investment Products
+61 2 9227 0237
[email protected]
Andrew Weaver
Senior Manager, Investment Product Specialists
+61 2 9227 0575
[email protected]
Rory Cunningham
Senior Manager, Investment Products
+61 2 9227 0171
[email protected]
Martin Dinh
Senior Investment Product Specialist
+61 2 9227 0138
[email protected]
Anastasia Anagnostakos
Business Development Manager
+61 2 9227 0863
[email protected]
Fabiana Candiano
Investment Product Specialist
+61 2 9227 0079
[email protected]
Roger Daniel
Investment Product Specialist
+61 2 9227 0028
[email protected]
Helen Chong
Business Development Manager
+61 2 9227 0028
[email protected]
---
Information provided does not constitute financial product advice. You should obtain independent advice from an Australian financial services licensee before making any financial decisions. Although ASX Limited ABN 98 008 624 591 and its related bodies corporates ("ASX") has made every effort to ensure the accuracy of the information at as the date of publication, ASX does not give any warranty or representation as to the accuracy, reliability or completeness of the information. To the extent permitted by law, ASX and its employees, officers and contractors shall not be liable for any loss or damage arising in any way (including by way of negligence) from or in connection with any information provided or omitted or from any one acting or refraining to act in reliance on this information.
© Copyright 2021 ASX Operations Pty Limited ABN 42 004 523 782. All rights reserved 2021
|
3d4d43c5-f2fd-4efb-84c8-8c84eb6a69ad
|
CC-MAIN-2021-43
|
https://www2.asx.com.au/content/dam/asx/issuers/asx-investment-products-reports/2021/pdf/asx-investment-products-sep-2021.pdf
|
2021-10-27T13:52:45+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00267-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 1,288,189,027
| 44,232
|
eng_Latn
|
eng_Latn
| 0.634807
|
eng_Latn
| 0.896453
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
3161,
7532,
10094,
14997,
16114,
17098,
23120,
27003,
27672,
28344,
41442,
52263,
61177,
73194,
83749,
96618,
108899,
120358,
132693,
144011,
145543,
155311,
159765,
166165
] |
5-minute First Aid for Babies (Five-Minute First Aid)
By The British Red Cross
Hodder Arnold, 2005. Paperback. Book Condition: New. Next day dispatch from the UK (Mon-Fri). Please contact us with any queries.
READ ONLINE [1.06 MB]
Reviews
This book is definitely not simple to begin on studying but quite fun to see. I actually have read and that i am sure that i will gonna read through yet again once again in the foreseeable future. It is extremely difficult to leave it before concluding, once you begin to read the book.
-- Brennan Koelpin
Comprehensive guide! Its this type of very good read through. It is actually written in simple words and phrases rather than difficult to understand. It is extremely difficult to leave it before concluding, once you begin to read the book.
-- Bernie Mante PhD
|
<urn:uuid:ebb5d994-9459-41f6-819a-b15f88d809cd>
|
CC-MAIN-2019-35
|
https://textbooks-caltech.netlify.com/09-miss-dora-lynch-i/9780340904602-5-minute-first-aid-for-babies-five-minute-first--.pdf
|
2019-08-23T10:46:15Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318375.80/warc/CC-MAIN-20190823104239-20190823130239-00093.warc.gz
| 675,060,208
| 180
|
eng_Latn
|
eng_Latn
| 0.998836
|
eng_Latn
| 0.998836
|
[
"eng_Latn"
] | false
|
docling
|
[
810
] |
Mission Trip Recommendation
I understand that participation on a Mission trip is not a University required event, and I will abide by the University's attendance policies. I acknowledge that any missed classroom or clinic time will not be excused, and that I will not receive any type of academic or clinical credits toward graduation through my participation in a mission trip.
Student Name (Non Clinic/ CLI):
Date:
Intern signature:
Clinician signature:
I acknowledge that the above-mentioned student is in good standing and has no outstanding work that needs completed. I am recommending this student as a good candidate for participation in a mission trip.
Name:
Signature:
Date:
Date:
Clinician signature:
Date:
I understand that participation on a Mission trip is not a University required event, and I will abide by the University's attendance policies. I acknowledge that any missed classroom or clinic time will not be excused, and that I will not receive any type of academic or clinical credits toward graduation through my participation in a mission trip.
I understand that I am responsible for my patient's care in my absence. I will work with my assigned clinicians to coordinate patient care during my absence and will have all outstanding work completed before leaving for this mission trip. SIGN
Intern Name (Clinic):
Date:
Pod:
I acknowledge that the above-mentioned intern is in good standing, has no outstanding work that needs completed, and is in compliance with clinic policy. I agree to help coordinate patient care while the intern is away on this mission trip.
SIGN
SIGN
SIGN
19-034-2122
|
<urn:uuid:b092b57a-fbef-4594-b3b6-f414bcf7239d>
|
CC-MAIN-2021-43
|
https://www.cleveland.edu/wp-content/uploads/pdfs/mission_trips/Mission_Trip_Recommendation-Interactive.pdf
|
2021-10-20T09:53:57+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00024-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 849,139,249
| 319
|
eng_Latn
|
eng_Latn
| 0.998982
|
eng_Latn
| 0.998982
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
1640
] |
Constitutional Rights as Property?:
The Supreme Court's Solution to the "Takings Issue"
Susan E. Looper-Friedman*
I. INTRODUCTION
The history of American land use law has been characterized by the classic constitutional conflict between individual rights and social interests. As with most, if not all constitutional issues, the problem results from the maintenance of a capitalist economy in an activist state.\(^1\) In the area of land use regulation this conflict has been referred to as the "takings issue."\(^2\) The issue involves the conflict between the states' police power to regulate land uses for the promotion and protection of the public's health, safety and welfare and the individuals' rights not to be unfairly burdened by such regulations.\(^3\)
Prior to the decision of *Pennsylvania Coal Co. v. Mahon*,\(^4\) the due process clause of the fourteenth amendment was the primary, if not sole, constitutional restriction on state exercises of the police power. In *Penn Coal*, however, Justice Holmes suggested that the power to regulate land uses might also be restricted by the takings clause of the fifth amendment,\(^5\) when he said that "while property may be regulated to a certain extent, if regulation goes too far it will be recognized as a taking."\(^6\)
* Associate Professor, Capital University Law School; B.A., 1977, University of Wisconsin; J.D., 1981, University of Santa Clara School of Law; LL.M., 1984, Harvard Law School. My special thanks to Beverly Bishop for her many hours of work on this article and to Don Hughes for listening to my arguments and disagreeing with them all.
1. For an excellent description of the problems of private property in the activist state, see B. ACKERMAN, PRIVATE PROPERTY AND THE CONSTITUTION 1-5, 100-103 (1977).
2. F. BOSSELMAN, D. CALLIES & J. BANTA, THE TAKINGS ISSUE (1973).
3. U.S. CONST. amend. V & XIV: no person shall be deprived "of life, liberty, or property, without due process of law. . . ."
4. 260 U.S. 393 (1922).
5. U.S. CONST. amend. V: "nor shall private property be taken for public use, without just compensation." This provision was made applicable to the states as an element of 14th amendment due process in Chicago, Burlington & Quincy R.R. v. Illinois *ex rel.* Drainage Comm'r, 200 U.S. 561, 593 (1906).
6. 260 U.S. at 415.
For the next fifty years, land use litigation focused around the question of how far a regulation could go before it would be considered to be a "taking." If a regulation went "too far," it was found to be constitutionally invalid, though rarely were the opinions clear as to whether the invalidity resulted from a lack of due process or a lack of just compensation. Even when regulations were held to be unconstitutional because they went "too far," the analyses were generally based on substantive due process and the remedy was nearly always invalidation of the offending regulation. Not until *Agins v. City of Tiburon* was the issue of just compensation for so-called "regulatory takings" addressed by the Supreme Court. The Court in *Agins* found that no taking had occurred, and thus never reached the issue of compensation. But after the *Agins* case, the focus of land use litigation shifted from the question of how far regulation could go to the question of whether just compensation must be paid if a regulation is found to have gone "too far."
After almost a decade of side-stepping the issue, the Supreme Court apparently disposed of the so-called "takings issue" in a trilogy of cases decided in 1987. In *Keystone* and in *Nollan* the issue was the more typical one of how far a regulation can go before it will be deemed a "taking." But in *First English* the Court finally answered the more controversial question of whether just compensation was required when a "regulatory taking" has occurred. The Court held that compensation is mandated when a governmental action effects a taking, even if the taking is only temporary.
Given the extensive media coverage the decision received and the flurry of law review articles and comments written about the issue, it would seem that the decision of *First English* is of great
---
7. 447 U.S. 255 (1980).
8. On four occasions prior to the decision of First English Evangelical Lutheran Church v. County of Los Angeles, 482 U.S. 304 (1987), the Court took on the compensation issue without resolving it: MacDonald, Sommer and Frates v. Yolo County, 477 U.S. 340 (1986); Williamson County v. Hamilton Bank, 473 U.S. 172 (1985); San Diego Gas and Electric Co. v. City of San Diego, 450 U.S. 621 (1981); Agins v. City of Tiburon, 447 U.S. 255 (1980).
9. Keystone Bituminous Coal v. DeBenedictis, 480 U.S. 470 (1987); *First English*, 482 U.S. 304; Nollan v. California Coastal Commission, 483 U.S. 825 (1987). While these three cases have been consistently referred to as a trilogy, they are not entirely consistent with each other and none of them cites either of the other two.
10. See, e.g., Bauman, *The First Church, Keystone, and Irving Cases: New Rules for Determining and Compensating Takings*, 1988 ZONING & PLANNING LAW HANDBOOK 251 (N. GORDON, ed.);
constitutional significance. Yet, the decision seems both simple and obvious: that a taking requires compensation and that temporary takings are compensable. Neither proposition is of particular constitutional significance; the first is simply a restatement of the fifth amendment takings clause, the second is a statement of established case law.\textsuperscript{11} The real question at the heart of the “takings issue” is not whether a “regulatory taking” requires just compensation, but rather whether a regulation can ever actually affect a taking for fifth amendment purposes.
The following discussion looks first at the \textit{First English} decision, what it said, what it appears to have said, and, more importantly, what it did not say. Then, in an effort to determine why the Court avoided the real question, it will look at the development of the “takings issue” prior to the \textit{First English} decision. The development occurs in three stages. In the first stage, the confusion between due process and takings analyses is created with the conflicting decisions of \textit{Mugler v. Kansas}\textsuperscript{12} and \textit{Penn Coal}. In the second stage, from \textit{Penn Coal} to \textit{Agins}, the confusion mounts as the Court struggles through the cases in an attempt to establish a coherent analytical framework in which to address the “takings issue.” The Court’s difficulty in dealing with the “takings issue” was noted by Professor Charles Haar who characterized the effort as “the lawyer’s equivalent of the physicist’s hunt for the quark.”\textsuperscript{13}
In the last stage prior to \textit{First English}, the “hunt for the
\begin{itemize}
\item Berger, \textit{The Year of the Taking Issue}, 1 B.Y.U.J. Pub. L. 261 (1987); Falik & Shimko, \textit{The “Takings” Nexus — The Supreme Court Chooses a New Direction in Land-Use Planning: A View from California}, 39 Hastings L.J. 359 (1988); Geraci & Narbozny-Younger, \textit{Damages for a Temporary Regulatory Taking: First English Evangelical Lutheran Church v. County of Los Angeles}, 24 Cal. W.L. Rev. 33 (1988); Large, \textit{The Supreme Court and the Takings Clause: The Search for a Better Rule}, 18 Envtl. L. 3 (1987); Martinez, \textit{Reconstructing the Takings Doctrine by Redefining Property and Sovereignty}, 16 Fordham Urb. L.J. 157 (1988); Peterson, \textit{Land Use Regulatory “Takings” Revisited: The New Supreme Court Approaches}, 39 Hastings L.J. 335 (1988); Sax, \textit{Property Rights in the U.S. Supreme Court: A Status Report}, 7 UCLA J. Envtl. L. & Pol’y 139 (1988); Siemon & Larsen, \textit{The Taking Issue Trilogy: The Beginning of the End?}, 33 Wash. U.J. Urb. & Contemp. L. 169 (1988); Strong, \textit{On Placing Property Due Process Center Stage in Takings Jurisprudence}, 49 Ohio St. L.J. 591 (1988); Symposium, \textit{The Jurisprudence of Takings}, 88 Colum. L. Rev. 1581-1794 (1988); Comment, \textit{Affirmative Relief for Temporary Regulatory Takings}, 48 U. Pitt. L. Rev. 1215 (1987); Comment, \textit{The Emergence of “Temporary Takings Damages” for Unconstitutional Restrictions on Land Use}, 1987 Det. C.L. Rev. 1095 (1987).
\end{itemize}
\textsuperscript{11} See Kimball Laundry Co. v. United States, 338 U.S. 1 (1949); United States v. Petty Motor Co., 327 U.S. 372 (1946); United States v. General Motors Corp., 323 U.S. 373 (1945).
\textsuperscript{12} 123 U.S. 623 (1887).
\textsuperscript{13} C. HAAR, \textit{Land-Use Planning} 766 (3d ed. 1976).
quark" is abandoned and the Court shifts its focus to the question of remedies, but effectively avoids any resolution of that issue. The discussion then returns to look at the *First English* decision in the context of its precedents, concluding that the Court has, in effect, created a property interest in the constitutional right to substantive due process. Finally, the lower courts' interpretations of the *First English* decision are examined. A survey of these cases leads one to the conclusion that although the Court failed to resolve many of the questions which the "takings issue" raises, its recent decision has refocused judicial attentions on the task of defining "regulatory takings" with surprising results.
II. THE FIRST ENGLISH DECISION
Of the three cases that comprise the Supreme Court's "takings trilogy," *First English* is perhaps the most noteworthy and certainly the most sensational.\(^{14}\) It was this case which, after nearly a decade of avoiding the issue, finally took up and decided the sticky question of remedies for so-called "regulatory takings."
The case came out of California, where the state's supreme court had already clearly established in the *Agins* decision that inverse condemnation\(^{15}\) is never an appropriate action when an exercise of the police power goes so far as to deprive a property owner of all reasonable use of her property.\(^{16}\) It was the existence of the *Agins* rule which allowed *First English* to come before the U.S. Supreme Court without any lower court determination of whether a taking had even occurred.\(^{17}\)
---
14. The case received a tremendous amount of media coverage, nearly all of which characterized the decision as a coup for developers and private property owners. *See, inter alia,* N.Y. Times, June 10, 1987, at 17; Washington Post, June 10, 1987, at A1; Time Magazine, June 22, 1987, at 64. In the discussion that follows, one will see that the effect of the case appears to have been quite the opposite.
15. Inverse condemnation is a cause of action under the fifth amendment to recover the value of property taken by the government when the government has not formally exercised its power of eminent domain. Ordinarily, the government takes property by instituting a direct condemnation proceeding in which the legitimacy of the public purpose is established and the amount of compensation is fixed. Here the proceeding is termed inverse since it is the property owner, rather than the government, who initiates the action. 6 J. Sackman, *Nichol's Law of Eminent Domain* § 24.1 (rev. 3d ed. 1980). *See also San Diego Gas & Electric*, 450 U.S. at 638 n.2 (Brennan dissenting).
16. *Agins v. City of Tiburon*, 24 Cal. 3d 266, 598 P.2d 25, 157 Cal. Rptr. 372 (1979), aff'd on other grounds, 447 U.S. 255 (1980).
17. *First English*, 482 U.S. at 311-313.
The plaintiff in this action maintained a summer camp on twenty-one acres of land it owned in the Mill Creek Canyon in Angeles National Forest. In 1977, a fire denuded the hills upstream from the camp, creating a serious flood hazard. A year later, such a flood occurred destroying all of the buildings on the camp and killing ten people. In response to the flood, the County of Los Angeles adopted an ordinance designating the Mill Creek Canyon a flood protection area and temporarily prohibiting the construction or reconstruction of any building in the flood protection area until measures could be taken to control the flooding.\(^{18}\) The ordinance contained no permit or variance provisions. Shortly thereafter, the church brought an action in inverse condemnation alleging that the ordinance deprived it of any economic use of the land and was therefore a "taking."\(^{19}\)
The trial court granted the county's motion to strike the allegation, basing its ruling on the holding in *Agins*. The California Court of Appeals affirmed, and the California Supreme Court declined to reconsider the *Agins* rule. The U.S. Supreme Court granted certiorari\(^{20}\) to review the constitutional validity of the *Agins* rule, thus isolating the issue of remedies for the Court's consideration.
Justice Rehnquist's majority opinion begins with his attempt to justify the Court's treatment of the remedies issue in the absence of a determination of a taking. In the four previous "takings" cases,\(^{21}\) the Court found that it would have been premature to consider the remedial question when there had been no final determination that a taking had in fact occurred.\(^{22}\) Yet, in this case the appellant had neither sought a building permit or variance from the ordinance nor had it alleged that any efforts to do so would have been futile. More importantly, the complaint did not
---
18. Los Angeles, Cal., Ordinance 11,855 (1979). The ordinance subsequently became permanent, but this fact had no bearing on the Court's decision. 482 U.S. at 313 n.7.
19. The church actually set out two claims. The first claim alleged that the County was liable under Cal. Gov't Code § 835 for dangerous conditions on their upstream properties that contributed to the flooding of the church's land. The second claim sought damages in tort and in inverse condemnation for the County Flood District's cloud seeding during the storm which caused the flood. 482 U.S. at 308.
20. 478 U.S. 1003 (1986).
21. *Agins*, 447 U.S. 255 (1980); *San Diego Gas & Electric*, 450 U.S. 621 (1981); Williamson County Regional Planning Comm'n v. Hamilton Bank, 473 U.S. 172 (1985); MacDonalld, Sommer & Frates v. Yolo County, 477 U.S. 340 (1986).
22. *First English*, 482 U.S. at 311.
allege a taking under the Constitution, nor did the California courts find that the church had stated a federal claim.
The Court cleverly evaded the final judgment rule established in the *Hamilton Bank* decision by noting that the church's complaint for damages had been dismissed solely on the grounds that *Agins* precluded monetary compensation, and not because of any factual dispute as to whether or not a taking had actually occurred. At one point, Rehnquist stated that the Court must proceed under the assumption that a taking had in fact occurred. In the next breath, however, he noted that the Court had
no occasion to decide whether the ordinance at issue actually denied appellant all use of its property or whether the county might avoid the conclusion that a compensable taking had occurred by establishing that the denial of all use was insulated as a part of the State's authority to enact safety regulations. These questions, of course, remain open for decision on the remand we direct today.
The Court's apparent willingness, if not eagerness, to take on an issue it could easily have avoided as being premature would seem to indicate that it was then finally able to provide a clear resolution to this very confused and confusing area of the law. Yet, by addressing the remedies issue in the abstract, the decision seems only to add to the considerable confusion of "takings jurisprudence."
Having disposed of the ripeness issue, the Court went on to address the question of whether just compensation is required when a regulatory taking, even if only temporary, is found. Looking primarily to the mandate of the fifth amendment, the Court had little trouble simply holding that just compensation is constitutionally required "in the event of [an] otherwise proper interference amounting to a taking."
As for compensating temporary takings, the Court relied on a line of World War II cases in which the government had taken over the operations of various businesses in order to advance the
---
23. *Williamson County Regional Planning Comm'n*, 473 U.S. 172 (1985).
24. *First English*, 482 U.S. at 312n.6.
25. *Id.* at 313 (citations omitted). It should be noted that when the case was remanded to the California court, the county's ordinance was found to be a reasonable moratorium for a reasonable period of time and thus did not affect a taking. *First English Evangelical Lutheran Church of Glendale v. County of Los Angeles*, 210 Cal. App. 3d 1353, 258 Cal. Rptr. 893 (1989).
26. *Id.* at 315 (emphasis added).
war effort. The court noted that "[t]hough the takings were in fact 'temporary,' . . . there was no question that compensation would be required for the Government's interference with the use of the property . . . ."27
The more difficult question was whether just compensation would be due for the period of time before a regulation is found to amount to a taking. This is the issue that the California Supreme Court in *Agins* decided in the negative, holding that a taking would not occur until the government elected to continue enforcing a regulation after it had been judicially determined to amount to a taking.28 In overruling *Agins*, the Court found that the government could not relieve itself of the obligation to pay just compensation by simply abandoning a regulation which, during the period it was effective, amounted to a taking. The Court noted that the result of the government's abandonment of a regulation upon the court's determination that it effects a taking is simply "'an alteration in the property interest taken — from [one of] full ownership to one of temporary use and occupation . . . .'"29 In other words, if a regulation "goes too far," it is the regulation that effects a taking and not the court's ultimate determination of its invalidity.
The question remains as to when the taking does begin and thus for what period of time compensation must be paid. The opinion simply states that compensation must be paid from the time that the regulation "effects a taking."30 At the same time the Court limited its holding stating that it did not "deal with the quite different questions that would arise in the case of normal delays in obtaining building permits, changes in zoning ordinances, variances, and the like which are not before us."31
When, then, does taking begin? If the taking is effected by the enactment of the offending regulation, then a landowner who successfully obtains a variance should be entitled to compensation for the temporary deprivation of use prior to obtaining the vari-
---
27. *Id.* at 318 (referring to Kimball Laundry Co. v. United States, 338 U.S. 1 (1949); United States v. Petty Motor Co., 327 U.S. 372 (1946); United States v. General Motors Corp., 323 U.S. 373 (1945)).
28. *Agins* v. City of Tiburon, 24 Cal. 3d 266, 276-277, 598 P.2d 25, 30-31, 157 Cal. Rptr. 372, 377-378 (1979).
29. 482 U.S. at 318 (quoting United States v. Dow, 357 U.S. 17, 26 (1958)).
30. *Id.* at 320 n.10. This is essentially the language Justice Brennan used in his dissent in *San Diego Gas & Electric*, 450 U.S. at 653.
31. *Id.* at 321.
ance. Such a result is clearly contrary to the Court's intent.\textsuperscript{32} Can one logically distinguish the landowner who obtains administrative relief by way of amendment, variance or special use permit from the landowner who obtains relief by judicial invalidation of the regulation? What event subsequent to enactment of the regulation and prior to judicial invalidation signals the beginning of the taking?\textsuperscript{33} If the taking begins only after the landowner has exhausted all available administrative remedies, then the government will be paying compensation measured by the time it takes for the courts to hear and decide the landowner's claim. To hold the regulating body \textit{not liable} for damages suffered as a result of delays over which it does have control (issuing permits, granting variances, etc.), yet \textit{liable} for damages suffered as a result of delays over which it does not have control (i.e. a backed up docket), seems rather unfair.
Another question left unanswered by the court is how compensation is to be calculated once the period of the temporary taking is defined. With permanent takings, compensation is generally calculated as the fair market value of the property at the time of the taking. With temporary takings where the government actually took possession of the property for a finite period of time, the measure of compensation has been the rental value of the government's use. But measuring compensation when the government has not actually enjoyed the use of the property taken is a trickier proposition.
In the several states that approve monetary compensation for temporary regulatory takings, five principal methods have been employed to measure compensation: public benefits, rental value, option price, before-after valuation, and interest on lost profits.\textsuperscript{34} Several articles have been written about the problems of valuation involved in measuring the landowner's loss in the event of a temporary regulatory taking.\textsuperscript{35} For the purposes of this article, suf-
\textsuperscript{32} \textit{Id.} at 318-20.
\textsuperscript{33} The complexity of this question is illustrated in the recent decision of the \textit{Williamson County Regional Planning Comm'n}, 473 U.S. 172 (1985). \textit{See} text accompanying notes 94-95, \textit{infra}.
\textsuperscript{34} Hagman, \textit{Temporary or Interim Damages Awards in Land Use Control Cases}, 4 \textit{Zoning & Plan. L. Rep.} 129, 142 (1981). Another method of measuring compensation using an insurance approach is suggested in Blume & Rubinfeld, \textit{Compensation for Takings: An Economic Analysis}, 72 \textit{Cal. L. Rev.} 569 (1984).
\textsuperscript{35} See, e.g., Hagman, \textit{Temporary or Interim Damages Awards in Land Use Control Cases}, 4 \textit{Zoning & Plan. L. Rep.} 129 (1981); Comment, \textit{Affirmative Relief for Temporary Regulatory}
fice it to say that the first four methods mentioned above bear no relation to the actual losses a landowner may suffer and the fifth method involves losses too speculative to be recoverable.
In light of the substantial "chilling" effect the *First English* decision is likely to have on municipal land use legislation, it is especially important that municipal liability be clearly defined. Justice Rehnquist's opinion ignores this issue entirely, apparently following the expressed sentiments of Justice Brennan in his *San Diego Gas* dissent that "the vindication of [constitutional] rights [cannot] depend on the expense in doing so."36
The final, and perhaps most important, question left unanswered by the *First English* decision is whether and how an exercise of the police power can ever be considered the equivalent of an exercise of the power of eminent domain for fifth amendment purposes. Justice Brennan raised this very issue in his *San Diego Gas* dissent when he stated that the issue in that case was whether just compensation is due in the event of a regulatory taking and further noted that
[i]mplicit in this question is the corollary issue whether a government entity's exercise of its regulatory police power can ever effect a "taking" within the meaning of the Just Compensation Clause.37
Unfortunately, he never addressed the issue in the rest of his opinion. Neither Rehnquist nor any of the *First English* dissenters even acknowledges this difficult question. The significance of this issue emerges as one looks at the development of the so-called "takings issue" in Supreme Court jurisprudence.
III. THE DEVELOPMENT OF THE 'TAKINGS ISSUE'
Ever since Holmes' opinion in the *Penn Coal* case, confusion has developed about whether excessive land use regulations should be reviewed under a substantive due process analysis or under a
*Takings*, 48 U. Pitt. L. Rev. 1215 (1987); Johnson, *Compensation for Invalid Land-Use Regulations*, 15 Ga. L. Rev. 559 (1981); Note, *It's Not Just Compensation, It's a Theory of Valuation as Well: Valuing "Just Compensation for Temporary Regulatory Takings,"* 14 Colum. J. Envt'l. Law 247 (1989). While a full discussion of the arguments made by these authors is beyond the scope of this article, each of them concludes that the difficulties in effectively measuring damages for temporary regulatory takings make inverse condemnation an undesirable avenue of relief.
36. *San Diego Gas & Electric*, 450 U.S. at 661 (1981) (Brennan, J., dissenting).
37. *Id.* at 646-47.
takings analysis.\textsuperscript{38} Prior to \textit{Penn Coal} it seemed clear that the only limitation on the government's exercise of police power was the fourteenth amendment's due process clause. A notable example of this kind of review is Justice Harlan's opinion in the case of \textit{Mugler v. Kansas}.\textsuperscript{39}
In that case, Mugler, the owner of a beer brewery, claimed that the effect of a state statute prohibiting the manufacture of alcoholic beverages was to deprive him of property without just compensation. The Court disagreed:
A prohibition simply upon the use of property for purposes that are declared, by valid legislation, to be injurious to the health, morals, or safety of the community, cannot, in any just sense, be deemed a taking or an appropriation of property for the public benefit. Such legislation does not disturb the owner in the control or use of his property for lawful purposes, nor restrict his right to dispose of it, but is only a declaration by the State that its use by any one, for certain forbidden purposes, is prejudicial to the public interests.\textsuperscript{40}
In effect the Court was saying that no property interest exists in a use which is determined by the legislature, in the exercise of its police power, to be contrary to the public interest. Having no property interest in such a use, one cannot claim that deprivation of that use constitutes a taking of property.
The focus of the Court's analysis in \textit{Mugler} was on the validity of the regulation in light of its public purpose rather than on whatever loss had been suffered by the individual. Thus, a valid exercise of the police power could never amount to a taking of property, for it is the very exercise of the police power which defines individual property interests.\textsuperscript{41}
\textsuperscript{38} Many commentators point to Holmes' opinion in \textit{Penn Coal} as the starting point of the confusion surrounding regulatory takings. See, e.g., Rose, \textit{Mahon Reconstructed: Why the Takings Issue is Still a Muddle}, 57 S. Cal. L. Rev. 561 (1984); Stoebuck, \textit{Police Power, Takings, and Due Process}, 37 Wash. & Lee L. Rev. 1057 (1980).
\textsuperscript{39} 123 U.S. 623 (1887).
\textsuperscript{40} \textit{Id.} at 668-69 (emphasis added).
\textsuperscript{41} Various commentators have advocated the position that property under our constitution is not defined in the Lockean sense as an absolute, pre-political right but rather as a right existing within a societal context and determined by social needs. See, e.g., Lipsker & Heldt, \textit{Regulatory Takings: a Contract Approach}, 16 Fordham Urb. L.J. 195 (1988); Oakes, "Property Rights" in Constitutional Analysis Today, 56 Wash. L. Rev. 583 (1981); Rose, \textit{Mahon Reconstructed: Why the Takings Issue is Still a Muddle}, 57 S. Cal. L. Rev. 561 (1984); and Schwartz, \textit{Property Rights and the Constitution: Will the Ugly Duckling Become a Swan?}, 39 Am. U.L. Rev. 9 (1987); Comment, \textit{The Origins and Original Significance of the Just Compensation Clause of the Fifth Amendment}, 94 Yale L.J. 694 (1985).
A very different view of property interests seems to have been taken by the Court in the *Penn Coal* case. The plaintiff in that case had purchased the surface property from the defendant coal company, which retained not only the right to mine under the surface, but the right to cause subsidence without liability.\(^{42}\) The plaintiff brought the action for violation of the Kohler Act which prohibited the mining of coal in such a way as to cause subsidence of land used for residential purposes. The coal company claimed that application of the Kohler Act to its property amounted to a taking without just compensation.
The Court, in an opinion written by Justice Holmes, agreed. Focusing on the diminution in value of the company's interest, Holmes concluded that the legislature had exceeded its power to reduce values in the exercise of its regulatory power. In effect, Holmes saw the government's power existing on a spectrum, with valid limitations at one end and takings at the other. When in the exercise of regulatory power the extent of the diminution "reaches a certain magnitude, in most if not in all cases there must be an exercise of eminent domain and compensation to sustain the act."\(^{43}\) Thus, while recognizing the government's right to diminish property values to a certain extent, he concluded that "if regulation goes too far it will be recognized as a taking."\(^{44}\)
On its face, it would seem that the *Penn Coal* decision, resting on the newfound idea of regulatory takings and the application of a diminution in value test, clearly contradicts the position taken by the Court in *Mugler*, which found no such limitation on otherwise proper exercises of the police power. It would seem that if Holmes' new takings analysis were applied to the facts of *Mugler*, the result would have been a finding that the Kansas statute was unconstitutional. Yet, Holmes neither overruled nor even mentioned the *Mugler* case in his opinion and, only six years later, appeared to back away from this position. In the case of *Miller v. Schoene*\(^{45}\), Holmes sided with the majority which relied on *Mugler* in upholding the power of the state to destroy the plaintiff's cedar trees in order to protect nearby apple orchards from the possibility of damage due to cedar rust.
\(^{42}\) Pennsylvania Coal Co. v. Mahon, 260 U.S. 393, 395 (1922).
\(^{43}\) Id. at 413.
\(^{44}\) Id. at 415.
\(^{45}\) 276 U.S. 272 (1928).
How are we to reconcile these two conflicting positions? Some have suggested that those who cite Holmes' "takings" language in *Penn Coal* have misinterpreted his use of the term "taking." They argue that Holmes, in an effort to avoid a discussion of substantive due process, used the word "taking" metaphorically rather than literally. What he meant was simply that regulations exceeding the limits of the police power have the same impact on the landowner as a direct condemnation without compensation being paid. Or so the argument goes.
Proponents of this theory argue that the validity of state regulation rests solely on fourteenth amendment substantive due process grounds. The three prong test for substantive due process, developed in the case of *Lawton v. Steele*, requires that state regulations must advance the interests of the public generally, rather then those of a particular class, by means which are reasonably necessary to accomplish that public purpose and which are not unduly burdensome upon individuals. Or, stated another way, 1) the *end* must be a proper one; 2) the *means* must be appropriate; and 3) the *end* must justify the *means*.
Indeed, Holmes' analysis of the validity of the Kohler Act would seem to follow the standard "three prong" test for sub-
---
46. Hippler, *Reexamining 100 Years of Supreme Court Regulatory Taking Doctrine: The Principles of 'Noxious Use,' 'Average Reciprocity of Advantage,' and 'Bundle Of Rights' from Mugler to Keystone Bituminous Coal*, 14 B.C. ENVTL. AFF. L. REV. 653 (1987); McGinley, *Regulatory 'Takings': The Remarkable Resurrection of Economic Substantive Due Process Analysis in Constitutional Law*, 17 ENVTL. L. REP. 10369 (1987); Williams, Smith, Siemon, Mandelker & Babcock, *The White River Junction Manifesto*, 9 VT. L. REV. 193 (1984).
47. *Id.* See also McGinley, *Regulatory 'Takings': The Remarkable Resurrection of Economic Substantive Due Process Analysis in Constitutional Law*, 17 ENVTL. L. REP. 10369 (1987), for a discussion of why Holmes may have avoided any reference to substantive due process in his *Penn Coal* opinion.
48. The New York Court of Appeals apparently followed this argument when it held that "when the State 'takes', that is appropriates, private property for public use, just compensation must be paid. In contrast, when there is only regulation of the uses of private property, no compensation need be paid." Fred French Investing Co. v. City of New York, 39 N.Y.2d 587, 593, 385 N.Y.S.2d 5, 8, 350 N.E.2d 381, 384 (1976). This is not to say that excessive regulation would be immune from constitutional scrutiny, rather that exercises of the police power would be examined under the Due Process Clause of the 14th Amendment and not the Just Compensation Clause of the 5th Amendment. Thus, an overly restrictive regulation "amounts to a deprivation or frustration of property rights without due process of law and is therefore invalid." 39 N.Y.2d at 594, 385 N.Y.S.2d at 8, 350 N.E.2d at 385.
49. 152 U.S. 133 (1894). This 3-prong test for substantive due process has become known as the *Lawton* test.
stantive due process.\textsuperscript{50} Looking at the purpose of the Act, Holmes saw the private house owner as the primary beneficiary of this mining prohibition. Subsidence damage to privately owned houses was not, in his opinion, a public nuisance even if similar damage was suffered by many individual owners. Hence, the goal of the regulation was not the promotion of the common or public good. Arguably, then, the Act failed on the first prong of the \textit{Lawton} test. Holmes went on to consider the extent of the Act's interference with the coal company's interests and concluded that "the statute does not disclose a public interest sufficient to warrant so extensive a destruction of the defendant's constitutionally protected rights."\textsuperscript{51} From this statement, most have derived a diminution of value test for takings under the fifth amendment. Yet, it seems equally plausible that Holmes struck down the regulation for failing the third prong of the \textit{Lawton} test, that is, that even if the end was legitimate, it did not justify the means.
Traditionally, the remedy for violations of due process has been invalidation of the offending regulation. When, however, the government actually takes property, the remedy dictated by the fifth amendment is the payment of just compensation. In light of the ultimate holding of the case (invalidation, not compensation), this interpretation appears even more likely.\textsuperscript{52}
This clearly has not been the traditional interpretation of the \textit{Penn Coal} opinion.\textsuperscript{53} Indeed, since the decision of \textit{Penn Coal}, Holmes' opinion is nearly always cited by courts when striking down overly burdensome land use regulations. And while these cases have generally resulted in mere invalidation of the offending regulation, references to the fifth amendment and to Holmes' takings language are usually employed.
\textsuperscript{50} Brandeis' dissent in \textit{Penn Coal} clearly follows this substantive due process argument. It has been suggested that the Holmes-Brandeis debate in this case was one of apples and oranges, Holmes concluding that the apple was rotten while Brandeis concluded that the orange was perfectly edible.
\textsuperscript{51} \textit{Penn Coal}, 260 U.S. at 414.
\textsuperscript{52} There are, however, those who suggest that the only reason just compensation was not awarded in this case is that the state of Pennsylvania was not a party. See, e.g., White, et al., \textit{Manifesto}, supra note 46 at 208 n.51.
\textsuperscript{53} \textit{Fred F. French Inv. Co.}, 39 N.Y.2d 587, is a notable exception.
On the other hand, when courts seek to uphold regulations which would seem to interfere with private property interests as much, if not more than many of the regulations struck down as "takings," the courts often cite to the language of *Mugler* and look only to the fourteenth amendment as the measure of the regulations' validity.\(^{54}\)
It is the survival of these two conflicting lines of precedent that has resulted in much confusion in the law of land use regulation. While Holmes' "takings" analysis was readily accepted by the courts, his failure to lay down a clear test to determine when a taking had occurred only added to the confusion. For the following fifty years or more, the courts struggled to develop some coherent standards to determine how far regulation could go before it would amount to a taking. The issue of remedies was not to arise until the late 1970's.\(^{55}\)
**IV. THE SEARCH FOR "TAKING" CRITERIA**
The task of formulating some coherent standards for evaluating the validity of regulation under the newly recognized "takings" analysis proved to be difficult, if not impossible. While commentators have developed several theories defining the fifth amendment limitations on state regulation,\(^{56}\) most of which have found some judicial support, no single theory has emerged to provide definitive guidance to the regulating bodies. And while much effort and ink has been spent developing these "new" theories, none of them seems to do much more than restate one of the three prongs of the *Lawton* test for substantive due process.\(^{57}\) A brief survey of the most popular of these theories will illustrate the point.
---
\(^{54}\) See, e.g., Calero-Toledo v. Pearson Yacht Leasing Co., 416 U.S. 663 (1974) (confiscation of owner's yacht used by a lessee to illegally transport drugs); Miller v. Schoene, 276 U.S. 272 (1828) (destruction of plaintiff's cedar trees to protect apple industry); Steele v. City of Houston, 603 S.W.2d 786 (Tex. 1980) (razing of owner's house in order to capture escaped prisoners).
\(^{55}\) San Diego Gas and Electric, 450 U.S. 621; Agins, 447 U.S. 255.
\(^{56}\) Berger, *A Policy Analysis of the Taking Problem*, 49 N.Y.U.L. Rev. 165 (1974); Callies, *Property Rights: Are There Any Left?*, 20 Urb. 597 (1988); Johnson, *Compensation for Invalid Land-use Regulations*, 15 Ga. L. Rev. 559 (1981); Large, *The Supreme Court and the Takings Clause: The Search for a Better Rule*, 18 Envtl. L. 3 (1987).
\(^{57}\) See, Stoebuck, *Police Power, Takings, and Due Process*, 37 Wash. & Lee L. Rev. 1057 (1980).
Economic Loss Theory. This theory developed directly from Holmes' "diminution of value" language in *Penn Coal* and focuses on the economic loss suffered as the result of a land use regulation to determine whether a taking has occurred. In practical application, the courts are divided on how much value must be lost before a taking occurs. While some courts have held that any significant diminution in value is sufficient to find a taking,\(^{58}\) the majority will find a taking only when a regulation denies a landowner any "reasonable" or "viable" use of his land.\(^{59}\) References\(^{60}\) to reasonableness or viability of the remaining use do nothing to lessen the ambiguity of the economic loss theory.
Courts have also had trouble agreeing about what property is to be considered when applying a diminution of value test. In *Penn Coal*, Holmes considered the estate in the support of the surface to be the property affected by operation of the Act.\(^{60}\) By defining the Company's interest this way, the effect of the Act was a total diminution in value. Brandeis saw the relevant property as being the Company's total interest in the land, an estate in both the subsurface minerals and the support of the surface.\(^{61}\) Viewed this way, the impact of the Act was much smaller.
Whatever approach is taken to resolve these problems in the application of an economic loss theory, the courts rarely consider economic losses without reference to the purposes of the offending regulation. In any event, consideration of the property owner's economic losses is essentially identical to the third prong of the *Lawton* test, which requires that any exercise of the police power be not overly burdensome on individual interests. One can surely say that when a regulation leaves an owner with no reasonable use for her property, the end does not justify the means.
\(^{58}\). Galt v. Cook County, 405 Ill. 396, 91 N.E.2d 395 (1950); Alsensas v. Brecksville, 29 Ohio App. 2d 255, 281 N.E.2d 21 (App. Ct. 1972).
\(^{59}\). Krause v. City of Royal Oak, 11 Mich. App. 183, 160 N.W.2d 769 (App. Ct. 1968); Stevens v. Town of Huntington, 20 N.Y.2d 352, 229 N.E.2d 591, 283 N.Y.S.2d 16 (1967).
\(^{60}\). *Penn Coal*, 260 U.S. at 414.
\(^{61}\). *Id.* at 419-20 (Brandeis dissenting). The "whole property" rule was later adopted by the court in *Penn Central Transportation Co. v. New York City*, 438 U.S. 104 (1978). A more recent example of the application of this view of the relevant property is *Keystone Bituminous Coal*, 480 U.S. 470, in which the Court sustained the validity of an act substantially identical to that struck down in *Penn Coal*.
Enterprise-Arbitration Theory. This theory was proposed by Professor Joseph Sax in his article, *Taking and the Police Power*. He suggested the following rule to determine when regulation would amount to taking:
[When economic loss is incurred as a result of government enhancement of its resource position in its enterprise capacity, then compensation is constitutionally required; it is that result which is to be characterized as a taking. But losses, however severe, incurred as a consequence of government acting merely in its arbitral capacity are to be viewed as a non-compensable exercise of the police power.]
An ordinance severely restricting land uses near a municipal airport would then be characterized as a taking since it is designed primarily to benefit a government activity. A prohibition on industrial uses in a residential area, having as its goal the elimination of private disputes, would not be considered a taking.
Sax's theory works well when considering regulations which fall clearly into one class of government activities or the other. Unfortunately, it is often unclear whether the government is acting in its enterprise capacity or its capacity as an arbiter when it regulates land uses. How, for example, should one characterize an open space regulation?
However one addresses this sort of problem, the focus of this theory of taking is on the purpose of the government action. When the purpose is improper (here, that is, to benefit an enterprise activity of the government), the action is characterized as a taking. How is this different from the first prong of the *Lawton* test which asks whether an exercise of the police power advances a legitimate public purpose, or, in other words, if the end is a proper one?
Harm-Benefit Theory. The harm-benefit theory has a long history predating the *Penn Coal* decision. The theory has been interpreted by several commentators and has been adopted in vari-
62. 74 YALE L.J. 36 (1964).
63. Id. at 63.
64. This theory was first articulated in a textbook written at the turn of the century by Professor Ernst Freund, who said, "[i]t may be said that the state takes property by eminent domain because it is useful to the public, and under the police power because it is harmful." E. FREUND, THE POLICE POWER at 546-47 (1904).
65. See, e.g., A. Dunham, *A Legal and Economic Basis for City Planning*, 58 COLUM. L. REV. 650 (1958); J. Sax, *Takings, Private Property and Public Rights*, 81 YALE L.J. 149 (1971).
ous forms by the courts.\textsuperscript{66} Like the enterprise-arbitration theory, the harm-benefit theory focuses on the purpose of government action. Regulations enacted for the purpose of preventing harm to private owners, particularly that caused by "noxious uses," would be upheld while those which confer a public benefit would be found invalid. Comprehensive zoning ordinances, for example, would be valid since their goal is to prevent harm to landowners caused by mixing incompatible uses.\textsuperscript{67} Examples of regulations that primarily confer a public benefit might include historic preservation or open space zoning.\textsuperscript{68}
Closely related to the harm-benefit theory of takings is the notion of "average reciprocity of advantage," a phrase coined by Holmes in his \textit{Penn Coal} opinion.\textsuperscript{69} The idea is that landowners burdened by a particular regulation may also enjoy the benefits the regulation is enacted to achieve. Courts following this idea hold that a taking does not occur if the regulation at issue confers an average reciprocity of advantage. Thus in \textit{Keystone Bituminous Coal Association v. DeBenedictis},\textsuperscript{70} the Court noted that its
hesitance to find a taking when the State merely restrains uses of property that are tantamount to public nuisances is consistent with the notion of "reciprocity of advantage" that Justice Holmes referred to in \textit{Pennsylvania Coal}. . . . While each of us is burdened somewhat by such restrictions, we, in turn, benefit greatly from the restrictions that are placed on others.\textsuperscript{71}
Like the enterprise theory discussed above, the harm-benefits theory looks to the legitimacy of a regulation's purpose. As such it may be viewed as merely an extension of the first prong of the \textit{Lawton} test, an additional example of proper and improper ends.
\textsuperscript{66} Cases decided under this theory are often referred to as "noxious use" cases. \textit{See, e.g.,} Hadacheck v. Sebastian, 239 U.S. 394 (1915); Goldblatt v. Hempstead, 369 U.S. 590 (1962).
\textsuperscript{67} Euclid v. Ambler Realty Co., 272 U.S. 365 (1926)(upholding the validity of a comprehensive zoning ordinance which prohibited the landowners' proposed commercial use, thereby reducing the land's value by 75%).
\textsuperscript{68} Yet, both of these purposes have been upheld by the Supreme Court. Berman v. Parker, 348 U.S. 26 (1954) & \textit{Penn Central Transportation Co.}, 438 U.S. 104 (aesthetic regulation); \textit{Agins}, 447 U.S. 255 (open space regulation). \textit{See generally} Mandelker, \textit{Land Use Takings: The Compensation Issue}, 8 \textit{HASTINGS CONST. L.Q.} 491, 499-506 (1981)(discussion of proper public purposes).
\textsuperscript{69} \textit{Penn Coal}, 260 U.S. at 415 (1922).
\textsuperscript{70} 480 U.S. 470 (1987).
\textsuperscript{71} \textit{Id.} at 491 (citations omitted).
Nexus Theory. Under this theory a regulation may effect a taking, even though its purpose is proper, if it is not reasonably calculated to achieve that purpose. The Court first suggested this limitation in *Nectow v. Cambridge*, when it held a zoning classification invalid as applied, because it failed to substantially advance legitimate state interests.\textsuperscript{72}
As Brennan stated in *Penn Central Transportation Co. v. New York City*, "a use restriction...may constitute a 'taking' if not reasonably necessary to the effectuation of a substantial government purpose."\textsuperscript{73}
While there is some disagreement as to how closely related the regulation must be to its purpose,\textsuperscript{74} the focus under this theory is essentially the same as that of the second prong of *Lawton* test, which requires that an exercise of the police power be "reasonably necessary for the accomplishment of [its] purpose...."\textsuperscript{75} In *Nollan v. California Coastal Commission*, however, Scalia argues that substantive due process requires only a "reasonable" rela-
\textsuperscript{72} 277 U.S. 183, 188 (1928).
\textsuperscript{73} 438 U.S. 104, 127 (1978) (by implication from Goldblatt v. Hempstead, 369 U.S. 590 (1962)).
\textsuperscript{74} In *Nollan v. California Coastal Commission*, 483 U.S. 825, 107 S.Ct. 3141 (1987), Justice Scalia, writing for the majority, argues that standards for determining "what type of connection between the regulation and the state interest satisfy] the [takings] requirement that the former 'substantially advance' the latter" are not the same as those applied to due process or equal protection claims. *Nollan*, 483 U.S. at 834-35 n.3, 107 S.Ct. at 3147 n.3. Citing the Court's opinion in *Agins*, he argues that in takings cases "[w]e have required that the regulation 'substantially advance' the 'legitimate state interest' sought to be achieved," not merely that the State "could rationally have decided the measure adopted might achieve the State's objective." \textit{Id}.
Justice Brennan disagreed that the standard in takings cases was different. In response to Scalia's comments, Brennan argued that
...our standard for reviewing the threshold question whether an exercise of the police power is legitimate is a uniform one. As we stated over 25 years ago in addressing a takings challenge to government regulation:
The term 'police power' connotes the time-tested conceptional limit of public encroachment upon private interests. Except for the substitution of the familiar standard of 'reasonableness,' this Court has generally refrained from announcing any specific criteria. The classic statement of the rule in *Lawton v. Steele* is still valid today: '...[It] must appear, first, that the interests of the public...require [government] interference; and, second, that the means are reasonable necessary for the accomplishment of the purpose, and not unduly oppressive upon individuals.' Even this rule is not applied with strict precision, for this Court has often said that 'debatable questions as to reasonableness are not for the courts but for the legislature.... *Nollan*, 483 U.S. at 843-44 n.1, 107 S.Ct. at 3151 n.1. (Brennan, J., dissenting) (citations omitted).
\textsuperscript{75} *Lawton*, 152 U.S. at 137 (1894). As Brennan points out in his dissent in *Nollan*, this rule has not been applied with strict precision. 483 U.S. at 843-44 n.1.
tionship, while a takings analysis requires a "substantial" relationship.\textsuperscript{76} Yet, if the threshold is higher under \textit{Nollan}'s nexus test, it seems clear that any regulation that would fail under a substantive due process analysis would necessarily amount to a taking according to \textit{Nollan}.
\textit{Balancing Theory}. Under this theory the validity of a regulation is tested by weighing the burdens imposed on individuals against the public purposes it serves. When private harm exceeds public benefit a taking is found. The test assumes that a system of regulations in which social gains outweigh private burdens is inherently fair. There are, however, those who would question that assumption.\textsuperscript{77}
As some commentators have noted,\textsuperscript{78} this test mirrors the traditional test of substantive due process established by the \textit{Lawton} case.\textsuperscript{79} This apparent inability of the Court to develop a takings test distinct from the traditional due process analysis was not much of a problem so long as the remedy provided under either approach was invalidation of the offending regulation. In fact, this doctrinal blurring seems to have gone unnoticed before the issue of remedies was first raised in \textit{Agins v. City of Tiburon}.\textsuperscript{80}
\section*{V. Wrestling with the Remedies Issue}
It was only a matter of time before someone decided that if an excessive land use regulation could amount to a taking, then just compensation under the fifth amendment ought to be paid. The Supreme Court first faced the question of compensation with the \textit{Agins} case.\textsuperscript{81}
\begin{itemize}
\item \textsuperscript{76} \textit{Nollan}, 483 U.S. at 834-35 n.3.
\item \textsuperscript{77} See, e.g., Michelman, \textit{Property, Utility, and Fairness: Comments on the Ethical Foundations of "Just Compensation"}, \textit{Law}, 80 Harv. L. Rev. 1165 (1967).
\item \textsuperscript{78} See, e.g., D. Mandelker, \textit{Land Use Law}, § 2.11 (1988); Humbach, \textit{Constitutional Limits on the Power to Take Private Property: Public Purpose and Public Use}, 66 Or. L. Rev. 547 (1988).
\item \textsuperscript{79} See supra text accompanying note 49.
\item \textsuperscript{80} 447 U.S. 255 (1980). For a discussion of the blurring between substantive due process and eminent domain see Stoebuck, \textit{Police Power, Takings, and Due Process}, 37 WASH. & LEE L. Rev. 1057 (1980); Frielich, \textit{Solving the "Taking" Equation: Making the Whole Equal the Sum of Its Parts}, 15 Urb. 447 (1983); see also Orion Corporation v. State of Washington, 747 P.2d 1062, 1076-1077.
\item \textsuperscript{81} The issue was actually first raised two years earlier in \textit{Penn Central}, where the plaintiff asked for damages in addition to declaratory relief. But, having concluded that the landmark designation did not effect a taking, the Court never addressed the issue of damages. \textit{Penn Central}, 438 U.S. at 119.
\end{itemize}
Agins came before the Court from California, where the City of Tiburon, in an effort to carry out the mandatory open-space element of its comprehensive plan,\(^{82}\) enacted new zoning ordinances which placed the plaintiffs' property in a zone restricted to single-family dwellings on large lots. The new ordinances would have permitted the plaintiffs to build between one and five single-family homes on their five acres. Without having sought approval for any plan of development, the plaintiffs brought an action in inverse condemnation against the city claiming that the ordinances "completely destroyed the value of their property."\(^{83}\)
At the trial level, the court sustained the city's demurrer, finding that the complaint failed to state a cause of action upon which relief could be granted. The California Supreme Court affirmed in an opinion which provides perhaps the most clearly articulated rationale for denying compensation in regulatory taking cases.
In response to the plaintiffs' assertion that, according to Penn Coal, an excessive regulation amounts to a taking for which just compensation is due, the California court noted the confusion between the constitutional limitations of due process and of just compensation generated by Holmes' opinion. Despite Holmes' language, the court found it "clear both from context and from the disposition in [Penn Coal], however, that the term 'taking' was used solely to indicate the limit by which the acknowledged social goal of land control could be achieved by regulation rather than by eminent domain."\(^{84}\) The court found that an award of compensation, prior to a determination that the regulation is indeed excessive, is a usurpation of the legislative discretion to exercise its power of eminent domain. Allowing the landowner to recover in inverse condemnation would be to allow the landowner to "transmute an excessive use of the police power into a lawful taking for which compensation in eminent domain must be paid"\(^{85}\) without the consent of the local legislature.
The court was ultimately persuaded by various policy considerations, including the need to preserve legislative control over
\(^{82}\) California requires all local governments which regulate land uses by zoning to adopt a comprehensive plan which must include various elements such as plans for the development of open-space land. Cal. Gov't Code § 65302 (West Supp. 1989).
\(^{83}\) Agins v. Tiburon, 24 Cal. 3d 266, 271, 157 Cal. Rptr. 372, 374, 598 P.2d at 27 (1979), aff'd, 447 U.S. 255 (1980).
\(^{84}\) Id. at 274, 157 Cal. Rptr. at 376, 598 P.2d at 29.
\(^{85}\) Id. at 273, 157 Cal. Rptr. at 375, 598 P.2d at 28.
land use policy and the desire to avoid "fiscal chaos," that inverse condemnation is an "inappropriate and undesirable remedy in cases in which unconstitutional regulation is alleged."\textsuperscript{86} In the end, the court found that Tiburon's ordinance did not effect a taking, and so even invalidation was unnecessary.
The Supreme Court affirmed the California court's holding that no taking could be found, particularly when the plaintiffs had not submitted and been denied any plans for development. Having found no taking, the Court believed the issue of remedies was not ripe for review.
The Court ducked the issue again in \textit{San Diego Gas & Electric Co. v. City of San Diego},\textsuperscript{87} another dispute grown out of California's open-space planning requirement. In this case the city placed the gas company's proposed power plant site under an open-space zoning classification which restricted the land to park and recreational uses. The gas company sought damages in inverse condemnation and was awarded $3 million by the trial court. The city's petition for rehearing was denied by the California Court of Appeal, but was granted by the state supreme court, thus vacating the Court of Appeal's decision. Before the hearing, however, the Supreme Court remanded the case to the Court of Appeal for reconsideration in light of the intervening decision of \textit{Agins v. City of Tiburon}. The Court of Appeal then reversed the judgment of the trial court in reliance on \textit{Agins}, holding that the gas company could not recover in inverse condemnation. It did not, however, invalidate either the zoning ordinance or the open-space plan. The California Supreme Court denied further review and the gas company appealed to the U.S. Supreme Court.
After a hearing on the merits of the appellant's claim that \textit{Agins} decision should be overruled, the Court concluded that it lacked jurisdiction because no final judgment of a taking had been made below. But in a dissenting opinion written by Justice Brennan, four members of the Court found not only that the judgment below was final, but that inverse condemnation should be available to landowners for temporary takings resulting from excessive regulation. Relying heavily on the \textit{Penn Coal} opinion, Brennan took the position that the California court's decision in \textit{Agins} "flatly contradicts clear precedents of this Court" which has "frequently
\textsuperscript{86} \textit{Id.} at 275, 157 Cal. Rptr. at 376, 598 P.2d at 29.
\textsuperscript{87} 450 U.S. 621 (1981).
found ‘takings’ outside the context of formal condemnation proceedings. . . ." In his view, a taking is a taking, whether accomplished by regulation or by condemnation: "From the property owner’s point of view, it may matter little whether his land is condemned or flooded, or whether it is restricted by regulation to use in its natural state, if the effect in both cases is to deprive him of all beneficial use of it." Under the rule Brennan proposed, once a taking is found, the government must pay compensation for the period of the taking, which, in the case of regulatory takings, begins "on the date the regulation first effected the ‘taking,’ and end[s] on the date the government entity chooses to rescind or otherwise amend the regulation."
Justice Rehnquist concurred with the Court’s holding that it lacked jurisdiction, but stated that he agreed with the dissenters that compensation was constitutionally mandated whenever a taking is found, whether by eminent domain, by physical invasion, or by excessive regulation. It appeared, then, that a majority of the Court was in agreement that compensation was the appropriate remedy for regulatory takings despite the absence of any case holding to that effect. Many state courts took Brennan’s dissent, coupled with Rehnquist’s concurrence, as a green light to awarding damages under the fifth amendment to aggrieved landowners. Others held to the position that inverse condemnation is not the appropriate remedy, and limited the remedy to invalidation. And while the question of compensation continued to
88. Id. at 647-48, 651-52.
89. Id. at 652.
90. Id. at 658.
91. E.g., Burrows v. City of Keene, 121 N.H. 590, 432 A.2d 15 (1981) (city’s amendment of zoning ordinance constituted inverse condemnation entitling landowners to damages); Scheer v. Township of Evesham, 184 N.J. Super. 11, 445 A.2d 46 (App. Div. 1982) (landowners whose property is temporarily “taken” as a result of certain zoning designations were entitled to the option value of parcel from date of enactment of ordinance); Rippley v. City of Lincoln, 330 N.W.2d 505 (N.D. 1983) (city zoning ordinance which deprived landowners of all reasonable use of their property was a taking for which just compensation is required).
92. E.g., Dade County v. National Bulk Carriers, Inc., 450 So. 2d 213 (Fla. 1984); Johnson v. Chatham County, 167 Ga. App. 283, 306 S.E.2d 310 (1983) (alleged act by county and metropolitan commission of maintaining inaccurate zoning map did not in any way cause a taking of plaintiff’s property for public use, and thus plaintiff did not have a claim for inverse conidemnation); Van Duyne v. City of Crest Hill, 136 Ill. App. 3d 920, 483 N.E.2d 1307 (1985) (landowners were not entitled to damages for permanent taking of their property based on theory of inverse condemnation, where trial court ruled in favor of landowners in action requesting declaration that city’s zoning ordinance was void).
plague the lower courts, the Supreme Court continued to avoid the issue.
In *Williamson County Regional Planning Commission v. Hamilton Bank*,\(^{93}\) the Court extended the ripeness rule of *Agins*, stating that it could not evaluate the claim for compensation until the plaintiff had exhausted its administrative remedies. This case involved a planning commission's refusal to approve a developer's subdivision plans after the controlling zoning ordinance was amended to decrease the maximum density permitted. The developer had obtained preliminary approval for its development plan prior to the zoning amendment. With preliminary approval, the developer proceeded to expend $3.5 million installing roads, water and sewer facilities and making other improvements. But the planning commission refused to grant final approval of the plan, finding the development would exceed the maximum density permitted under the new zoning ordinance. The trial court awarded compensation, concluding that this retroactive application of the zoning amendment effected a taking. The court of appeals affirmed the award.
In an opinion written by Justice Blackmun, the Supreme Court reversed and remanded, stating that the claim for compensation was not ripe for review until the plaintiff has sought and been denied variances from the offending zoning and subdivision ordinances. Until that time, the administrative agency has not arrived at a "final, definitive position" as to how the regulations affect the plaintiff's land and so the courts have no basis for evaluating the taking claim. One year later, in *McDonald, Sommer & Frates v. Yolo County*,\(^{94}\) the Court again invoked the ripeness rule, avoiding once more any resolution of the compensation issue.
**VI. FIRST ENGLISH REVISITED**
The Court finally disposed of the compensation issue with its holding in the *First English* case, following to a large degree Brennan's dissent in *San Diego Gas*. The Court found not only that damages are available for regulatory takings, but that due to the self-executing nature of the fifth amendment, compensation is mandatory once a taking is found. The Court not only found that
---
\(^{93}\) 473 U.S. 172 (1985). For a thorough discussion of this case see Smith, *The Hamilton Bank Decision: Regulatory Inverse Condemnation Claims Encounter Some New Obstacles*, 29 J. Urb. & Contemp. L. 3 (1985).
\(^{94}\) 477 U.S. 340 (1986).
invalidation was an inadequate remedy, but by overruling the California court's holding in *Agins*, it clearly rejected the notion that a taking cannot be found prior to a determination that the regulation in question exceeds constitutional limits. The California court in *Agins* had found that the power to take property for public purposes rests solely in the legislative body and requires a legislative intent to take. When the legislature enacts a regulation, its intent clearly is not to take property. Only when the legislature chooses to enforce a regulation after it has been found to be constitutionally invalid can it be said there is an intent to take. At that point, according to the California court, damages under the fifth amendment begin to accrue.
The Court in *First English* focused on the affected landowner rather than on the intent of the legislature to determine when a taking begins and indicated that compensation must be paid for the period beginning at the time the offending regulation effected a taking and ending when the government chooses to rescind or otherwise amend the regulation.\(^{95}\) From the landowner's point of view, a regulation effects a taking when it is enacted or otherwise becomes effective. The government, then, is liable for those losses suffered prior to a judicial determination that the regulation, presumably adopted in good faith, is in effect a taking.
On the other hand, the Court implied that the government would not be liable for losses suffered due to "normal delays" in obtaining building permits, zoning changes, variances, and the like."\(^{96}\) As was noted above,\(^{97}\) the Court appears to have said that the government will be held harmless for damages resulting from delays in processes over which it does have control, but will be held liable for those resulting from delays in adjudication, a process over which it has no control. Furthermore, the holdings in *Hamilton Bank* and *McDonald* will only lengthen the delays in the judicial process by requiring an aggrieved landowner to pursue every other possible avenue of relief before proceeding with a claim under the fifth amendment. This result seems particularly
\(^{95}\) This language is actually taken from Brennan's dissent in *San Diego Gas & Electric*, 450 U.S. at 653. The opinion in *First English* does not define the period for which compensation must be paid. Nevertheless, because Rehnquist in effect adopted Brennan's dissenting opinion in *San Diego Gas & Electric*, it seems safe to assume that this is how the Court would define the period of the temporary taking.
\(^{96}\) *First English*, 482 U.S. at 321.
\(^{97}\) See supra text accompanying notes 32-33.
unfair since the governing bodies have received no guidance from the Court as to when their regulations may be found to amount to takings, and thus how to avoid liability.
Justice Stevens noted the problems created by the majority when it distinguished these two types of delays, and suggested that delays in the process of litigation should be considered "just as 'normal' as an administrative [delay]." This is essentially the position taken by the California court in *Agins*, which therefore concluded that invalidation was an adequate remedy, since prior to such a judicial determination a taking cannot be found to have occurred. Once a regulation is declared invalid, the government may then choose either to leave it in force and pay permanent damages (essentially an exercise of eminent domain) or to repeal the regulation. If the government chooses to pay damages, then the landowner is fully compensated for any losses suffered. If it repeals the regulation, then the landowner is in the same position she would have been had she sought and been granted a variance except that it may have taken longer to obtain the judicial relief after exhausting administrative remedies. It is the losses suffered during this additional delay that the Court now holds are compensable.
Surely the 'property' lost by the landowner pending an administrative decision to grant a variance is no different in kind from that lost pending a judicial determination of taking. The only thing distinguishing these two landowners is the *quantum* of their loss. But, once a taking has been found, the courts *must* award compensation, however great or small the loss. How, then, can this unequal treatment be justified?
**VII. CONSTITUTIONAL RIGHTS AS PROPERTY**
First, one must ask if a landowner denied administrative relief, who then obtains a judgment that the government's regulation amounts to a takings, has been deprived of something that the landowner who is granted administrative relief has not. As we began to see in the discussion of "takings criteria" above, there seems to be little, if anything, distinguishing the various "takings" tests from the traditional test for substantive due process. If the tests are substantially identical, then we can say that the land-
98. *First English*, 482 U.S. at 334-35 (Stevens, J., dissenting).
99. *Loretto v. Teleprompter Manhattan CATV Corp.*, 458 U.S. 419 (1982).
owner who obtains a favorable judgment on the question of "taking," has been deprived of her right to substantive due process under the fourteenth amendment. Is the same not true of the landowner who does obtain administrative relief?
One cannot say that a government act violates the due process clause, or any other constitutional standard, until the government has acted. According to *Hamilton Bank*, the government's action is not complete "until the administrative agency has arrived at a final, definitive position regarding how it will apply the regulation at issue to the particular land in question." To further support this position, Justice Stevens, in his concurring opinion, went on to say:
The Due Process Clause of the Fourteenth Amendment requires a State to employ fair procedures in the administration and enforcement of all kinds of regulations. It does not, however, impose the utopian requirement that enforcement action may not impose any cost upon the citizen unless the government's position is completely vindicated. We must presume that regulatory bodies . . . generally make a good-faith effort to advance the public interest when they are performing their official duties, but we must also recognize that they will often become involved in controversies that they will ultimately lose. Even though these controversies are costly and temporarily harmful to the private citizen, as long as fair procedures are followed, I do not believe there is any basis in the Constitution for characterizing the inevitable by-product of every such dispute as a "taking" of private property.
Thus, unless one claims that the process of obtaining administrative relief itself is unfair, one cannot claim to have been deprived of any constitutional rights until the process is complete. Therefore, the landowner who successfully pursues an administrative remedy cannot claim to have been deprived of her right to substantive due process.
Now we can distinguish the loss suffered by the landowner who must pursue a judicial remedy from that of the landowner who obtains administrative relief, and thus justify the decision in *First English* to compensate the former but not the latter. But the compensation must be for the loss of a constitutional right, not for the loss of the use of land. As we have already noted, the lost land use interests of each are indistinguishable in kind. And since the
100. *Hamilton Bank*, 473 U.S. at 191.
101. *Id.* at 205.
remedy mandated by *First English* is compensation under the fifth amendment for the taking of property, it appears that the Court has created a property interest in the constitutional right to substantive due process.
While damages for the deprivation of constitutional rights may be available under § 1983,\(^{102}\) the remedy is not automatic and many potential defendants enjoy some form of immunity, particularly when they are acting in good faith.\(^{103}\) If, however, compensable property interests are created in constitutional rights, not only is government liability automatic, due to the "self-executing character of the constitutional provision with respect to compensation . . .,"\(^{104}\) but good faith becomes irrelevant. The financial impact on municipalities could be devastating. As Justice Stevens suggests in his dissent in *First English*, cautious local officials may simply decline to regulate, "even perhaps in the health and safety area", rather than risk taking any action that may later be found to amount to a taking and hence result in financial liability.\(^{105}\)
Whether the property taken is an interest in land, a contract right, or a constitutional right, the fifth amendment requires, in addition to the payment of just compensation, that the property be taken "for public use." Even when the government initiates a condemnation action and is ready to pay just compensation, it cannot take property for purposes which are not sufficiently public. As the Court has often said, the fifth amendment is "designed to bar Government from forcing some people alone to bear *public* burdens which, in all fairness and justice, should be borne by the
---
102. 42 U.S.C. § 1983 (1982) states:
Every person who, under color of any statute, ordinance, regulation, custom, or usage, of any State or Territory or the District of Columbia, subjects, or causes to be subjected, any citizen of the United States or other person within the jurisdiction thereof to the deprivation of any rights, privileges, or immunities secured by the Constitution and laws, shall be liable to the party injured in an action at law, suit in equity, or other proper proceeding for redress.
For a further discussion of the applicability of § 1983 to regulatory takings, see *Takings, Section 1983 and Land Use Disputes* (Freilich & Carlisle, eds. 1988); Bley, *Use of the Civil Rights Act to Recover Damages for Undue Interference with the Use of Land*, 1985 Inst. on Plan., Zoning & Eminent Domain, ch. 7; Johnson, *Compensation for Invalid Land-Use Regulations*, 15 Ga. L. Rev. 559 (1981).
103. See generally Mandelker, *Land Use Law* §§ 8.25-8.36.
104. *First English*, 482 U.S. at 315 (quoting United States v. Clarke, 445 U.S. 253, 257 (1980)).
105. *Id.* at 340-41 (Stevens, J., dissenting).
public as a whole."106 Surely the deprivation of a constitutional right cannot be considered a public burden which, "in all fairness and justice," should be automatically borne by the public as a whole.
An award of compensation under the fifth amendment necessarily implies that the underlying government action is otherwise legitimate. The First English opinion indicated that regulations which amount to takings would be valid but for the lack of just compensation paid. Yet, quite often the purposes sought to be achieved by way of governmental regulation could not be achieved even by an outright exercise of the government's power of eminent domain.107 One must wonder whether, "in all fairness and justice," the public as a whole should bear the burden of paying for losses suffered as the result of regulations declared unconstitutional for want of legitimate public purpose.
This interpretation of First English is clearly contrary to Rehnquist's statement in the opinion itself that the fifth amendment "is designed not to limit the governmental interference with property rights per se, but rather to secure compensation in the event of otherwise proper interference amounting to a taking."108 The Court is obviously avoiding the question of how the courts are to determine when a regulation amounts to a taking. Nevertheless, it seems clear that a regulation's validity is not to be tested under the fifth amendment. A regulation must, therefore, first pass muster under the fourteenth amendment's requirements of procedural and substantive due process before compensation for a taking becomes an issue. As we've already noted, however, the very facts which have led the courts to characterize a regulation as a taking should likewise support a finding of invalidity for want of due process.
VIII. LOWER COURTS' INTERPRETATIONS OF FIRST ENGLISH
However we as commentators may interpret the First English decision, the true test of its meaning lies with the lower courts' decisions following it. In his First English dissent, Justice Stevens was certain that the majority's decision would generate an explosion of unproductive litigation which would "undoubtedly have a sig-
106. Id. at 318-19 (quoting Armstrong v. United States, 364 U.S. 40, 49 (1960)) (emphasis added).
107. Arguably, Nollan fits this description.
108. First English, 482 U.S. at 315.
significant adverse impact on the land-use regulatory process."109 With the potential for large damage awards against regulating authorities,110 many have predicted that a high court decision favoring inverse condemnation actions for excessive regulation would have disastrous effects on land use planning, environmental protection, growth control, and historic preservation.111
It was not at all clear how broadly applicable the Court's opinion was intended to be in light of Rehnquist's limited holding (i.e., a challenge to a regulation as depriving the owners of *all reasonable use*).112 Any doubt as to the Court's intentions was removed only weeks later when it decided the *Nollan* case. The owners in that case were not claiming a deprivation of all reasonable use, only that the commission's exaction was not reasonably necessary to its purpose. The Court, nevertheless, found a taking and remanded the case for a determination of the compensation due.113 Looking at the two cases together, it seems clear that the Court intended compensation to be mandatory whenever a regulation is found, for whatever reason, to exceed constitutional bounds. Thus, the fears expressed by Stevens and others seemed well founded. Fortunately, most of their predictions have not played out, at least not as of yet.
Since June of 1987, when *First English* and *Nollan* were decided, a total of 111 state and federal cases dealing with land use regulatory takings have been reported.114 While this is not an insignifi-
---
109. *Id.* at 322 (Stevens, J., dissenting).
110. The day after the decision was published, the *New York Times* quoted the spokesman for a group of property owners as saying the decision "means the state owes us hundreds of millions of dollars, perhaps more than a billion." N.Y. Times, June 10, 1987, at A1, col. 6.
111. Justice Stevens punctuated his dissenting opinion in *First English* by expressing his fear that "much important regulation will never be enacted, even perhaps in the health and safety area." *First English*, 482 U.S. at 340-41. See also Freilich, *Solving the "Taking" Equation: Making the Whole Equal the Sum of Its Parts*, 15 Urb. 447 (1983); Geraci & Nabozny-Younger, *Damages for a Temporary Regulatory Taking: First English Evangelical Lutheran Church v. County of Los Angeles*, 24 Cal. W.L. Rev. 33 (1988); Peterson, *Land Use Regulatory "Takings" Revisited: The New Supreme Court Approaches*, 39 Hastings L.J. 335 (1988); Stoebuck, *Police Power, Takings, and Due Process*, 37 Wash. & Lee L. Rev. 1057 (1980).
112. *First English*, 482 U.S. at 321.
113. The Nollans ultimately settled with the California Coastal Commission for the payment of their attorney's fees. (Phone conversation with Asst. Atty General Andrea Sheridan Ordin on February 15, 1989)
114. Lexis search of all cases, state and federal, retrieved as of October 1, 1989, using "regulat! w/15 tak! w/15 compensat! or damages" and pulling all cases citing to either *First English* or *Nollan*.
cant number of cases, it hardly represents an explosion of litigation. Surprisingly few of the cases were brought under the fifth amendment for just compensation; fifty-two were brought for declaratory judgment, twenty-eight were brought for damages under § 1983, and only thirty-one were brought in inverse condemnation. Of these cases, sixty-two were decided on their merits; the others were either dismissed on various procedural grounds or remanded to determine if a taking had occurred. Takings were found in only fourteen of the sixty-two cases decided on their merits: five federal cases and nine state cases. Among these fourteen cases, damages under the fifth amendment were awarded in only two cases: one federal and one state.
The first of the two cases in which damages were awarded under the fifth amendment, *Yuba Natural Resources, Inc. v. United States*,\(^{115}\) involved a title dispute between the plaintiff and the government as to mining rights under land owned by the government. The plaintiff, Yuba, had been mining under the property since the turn of the century. In 1976, Yuba received a letter from the Army Corps of Engineers claiming that the mineral rights belonged to the government and that Yuba was prohibited from taking the minerals from the land. Yuba then brought a quiet title action, which it later won in 1981. It then brought this action for compensation for the six-year taking of its right to mine. The court found that the government had temporarily taken the plaintiff's mining rights and awarded compensation measured by plaintiff's lost profits. The fact that the government claimed title to the property involved certainly takes this case out of the mainstream of regulatory takings cases. The government's exercise of dominion over the mining rights brings the case into the category of true condemnations where awarding compensation has never been at issue.
The second case in which compensation was awarded, *Dept. of Agriculture v. Mid-Florida Growers*,\(^{116}\) is nearly identical in its facts to *Miller v. Schoene*,\(^{117}\) where no taking was found. In this case the state destroyed the plaintiff's orange trees to prevent the spread of citrus canker. The Florida Supreme Court held that compensation was required when the state, pursuant to its police power, destroyed healthy trees. The case may be distinguished from
\(^{115}\) 821 F.2d 638 (Fed. Cir. 1987).
\(^{116}\) 521 So. 2d 101 (Fla. 1988), cert. denied, 109 S.Ct. 180 (1988).
\(^{117}\) 276 U.S. 272 (1928). See supra text accompanying note 45.
Miller in that there was proof that the plaintiff's trees did not have citrus canker, and thus their destruction could not have promoted the legitimate public purpose of preventing the spread of the disease. Furthermore, the state's action was permanent and irreversible, and thus invalidation of the regulation as applied to this plaintiff would have provided no remedy.
There were twelve other cases in which a taking was found but damages under the fifth amendment were not awarded. In three of them damages were awarded under § 1983.\textsuperscript{118} In another the court awarded damages under the state's constitution.\textsuperscript{119} The other eight resulted in declaratory judgments only or declaratory judgment coupled with affirmative relief.\textsuperscript{120} These eight cases run contrary to the Supreme Court's finding that the fifth amendment \textit{mandates} the award of just compensation whenever a taking is found. If the payment of just compensation is a "self-executing" remedy under the fifth amendment, does the fact that the plaintiff only asked for declaratory relief relieve the courts of the obligation to award compensation?
Given the difficulty of measuring damages for temporary regulatory takings,\textsuperscript{121} it is not surprising that the courts would be reluctant to characterize any regulation as a taking. The easy way out of the \textit{First English} mandate is simply to declare the offending regulation to be an invalid exercise of the police power and avoid the use of the term "taking" altogether. Without clear guidance as to when regulations do amount to takings, the courts have been free to do exactly that, and apparently have. Only in the most extreme cases when there is a total, irreversible deprivation
\textsuperscript{118} Herrington v. County of Sonoma, 834 F.2d 1488 (9th Cir. 1987), \textit{cert. denied}, 109 S.Ct. 1557 (1989); Wheeler v. City of Pleasant Grove, 833 F.2d 267 (11th Cir. 1987); Front Royal & Warren Cty. Ind. Park v. Front Royal, 708 F. Supp. 1477 (W.D.Va. 1989).
\textsuperscript{119} Poirier v. Grand Bland Tp., 423 N.W.2d 351 (Mich. App. 1988).
\textsuperscript{120} Georgia Outdoor Advertising v. City of Waynesville, 690 F. Supp. 452 (W.D.N.C. 1988) (city enjoined from enforcing ordinance unless compensation paid); The Mill v. State Department of Health, 1989 Colo. App. LEXIS 234 (remanded for further proceedings in condemnation); Builders Service v. Planning & Zoning Comm'n, 545 A.2d 530 (Conn. 1988) (city given 120 days to amend ordinance); Bevan v. Township of Brandon, 440 N.W.2d 31 (Mich. App. 1989)(injunction granted and attorneys fees awarded); Seawall Associates v. City of New York, 542 N.E.2d 1059 (N.Y. 1989) (permanent injunction granted); Karches v. City of Cincinnati, 526 N.E.2d 1350 (Ohio 1988) (trial court held zoning was valid and only that issue was appealed); Allingham v. City of Seattle, 749 P.2d 160 (Wash. 1988) (no damages sought); Otte v. State, Dept. of Natural Resources, 418 N.W.2d 16 (Wis. App. 1987) (state's order to maintain a ditch set aside).
\textsuperscript{121} See text accompanying notes 34-35 supra.
of all use do the courts seem willing to characterize an excessive regulation as a taking.
IX. CONCLUSION
For fifty years following Holmes' opinion in the *Penn Coal* case the courts have struggled fruitlessly to establish clear standards for determining when excessive regulation becomes a taking. Without resolving that issue, the courts have spent the past decade wrestling with the question of whether just compensation is due in the event of a "regulatory taking." The Supreme Court's decision of *First English* has finally laid that question to rest. But in holding that compensation is mandated whenever property is taken, by whatever means, whether temporarily or permanently, the Court leaves us with the question of what property is it for which compensation is to be paid. By refusing to find takings prior to the granting of variances, zoning amendments, or other administrative remedies, one must logically conclude that the plaintiff who succeeds in an inverse condemnation action is being compensated for the deprivation of her constitutional right to substantive due process and not for the temporary loss of the use of her land. The lower courts have clearly rejected the idea of elevating a constitutional right to the status of property for fifth amendment purposes. The financial implications of accepting such an idea are indeed frightening. The effect of the *First English* decision has been to refocus the courts' energies on the task of defining "regulatory takings." The result so far has been a more conservative use of the term "taking" when the courts are reviewing excessive exercises of the police power and a more liberal use of the *Lawton* standards for substantive due process.
|
84e3c91b-a639-4ff3-a635-33e4dc8d3eb5
|
CC-MAIN-2022-33
|
https://journals.library.columbia.edu/index.php/cjel/article/download/5788/2847/10048
|
2022-08-20T01:51:07+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-33/subset=warc/part-00016-d466b69e-be2b-4525-ac34-1b10d57329da.c000.gz.parquet
| 306,463,292
| 20,035
|
eng_Latn
|
eng_Latn
| 0.987987
|
eng_Latn
| 0.993037
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
2326,
5150,
8637,
11498,
14261,
16805,
19399,
22324,
24867,
28017,
30469,
33593,
36246,
38832,
41498,
43992,
46945,
50395,
53439,
56123,
58701,
61660,
64091,
66808,
69222,
71696,
74510,
76881,
79897,
82470,
85624,
87341
] |
Independent Study Contract
Northern Baptist Theological Seminary
QUALIFICATIONS: Only students who have earned a minimum of 24 hours at Northern, and who have at least a 2.75 cumulative GPA will qualify for an Independent Study. An administrative fee of $300 is attached to each Independent Study.
LIMITATIONS: Independent Studies are not permitted for regularly scheduled courses at Northern or for courses available from ACTS seminaries. Students may not do an Independent Study to raise a grade for a course. The normal late work policy applies to all Independent Studies. A student cannot take more than four Independent Studies toward the M.Div. degree or two Independent Studies toward a two-year degree.
ACADEMIC EXPECTATIONS: Independent Studies require comparable levels of academic work when compared to a course carrying the same number of credits, and subject to the same regulations as regularly offered courses. A fair compensation of time normally spent in the classroom should be evident in the proposed study.
FACULTY SUPERVISION: An Independent Study course may be negotiated with a member of the regular or adjunct faculty for any quarter. However, if completed with an adjunct or affiliate professor, the student will pay an additional tuition charge of $150. Faculty members are limited to teaching a maximum of two Independent Studies per quarter.
INSTRUCTIONS: In order to register for an Independent Study, the student must submit this contract by the prescribed period of registration (not through the student portal). This form must be filled out completely by the student and signed by the Independent Study supervisor before being sent to the Registrar no later than the first day of registration for the term.
Name:
ID #:
Program:
Qtr/Yr:
No. of credit hrs. completed:
Cum. GPA:
No. of IS Contracts to date:
Title:
Hrs. Credit:
Circle areaof study: CH CT ED NT ME MN OT PC SP TE TH WO YM
Level (check one): 300
400_
500__
Reasons for requesting this Independent Study:
__________________________________________________________________________________
____________________________________
Approvals:
Date:
Approve
Deny
IS Faculty Supervisor SIGN
Date:
Approve Deny
Registrar
Assigned Course Number: _IS
SIGN
Independent Study Contact
1. Describe the course objectives:
_________ _________ _________ _________
2. Describe the work to be done, including how the bibliography is to be used, the type and length of the project to be completed, the kind of research to be conducted, etc.
_________ _________ _________ _________ _________ _________
3. Indicate the dates specific requirements will be completed:
_________ ____
4. Describe the specific methods and procedures to be used in the evaluation (e.g., oral exam, written exam, periodic oral and/or written reports, final research papers, etc.): _
_________ _________ _________ _________
5. Attach a complete bibliography to be used in the course which shows number of pages to be read (minimum of 1,000 required).
|
<urn:uuid:bfea21ec-0fe9-40e1-b16c-f2b98368b772>
|
CC-MAIN-2021-39
|
https://student.seminary.edu/wp-content/uploads/sites/2/2020/04/Independent-Study-Form_fill-in-able.pdf
|
2021-09-21T23:48:07+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-39/subset=warc/part-00040-f465d820-0362-4c4c-a396-c69f5fd24cc4.c000.gz.parquet
| 582,535,311
| 625
|
eng_Latn
|
eng_Latn
| 0.993388
|
eng_Latn
| 0.996336
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2317,
3086
] |
Bilingual & Bicultural Services
- Individual Counseling
- Family Counseling
- Support Groups
- Housing Assistance
- Education Assistance
- Employment Support
- Peer-To-Peer Support
Other services tailored to the needs of the participants and/or family members.
Staff Members
- Clinicians
- Case Managers
- Parent Partners
- Housing/Employment Coordinator
- Rehabilitation Service Coordinator
Services Available in Vietnamese, Korean, Tagalog, Samoan, Khmer, Cantonese, Mandarin, Japanese, Hmong, and other Asian Pacific Islander Languages.
API Behavioral Health Collaborative
OCAPICA
12912 Brookhurst St., Suite #480
Garden Grove, CA 92840
Phone: (714) 636-6286
Korean Community Services
7212 Orangethorpe Ave., Suite #8
Buena Park, CA 90621
Phone: (714) 449-1125
Southland Integrated Services
8251 Westminster Blvd., Suite #110
Westminster, CA 92683
Phone: (714) 839-4441
Project FOCUS is a full service partnership wraparound program, which provides bilingual and culturally appropriate case management, mental health services, and other supportive services such as access to basic resources for children, transitional aged youth, and their families. The goal of Project FOCUS is to "do whatever it takes" to support participants in their recovery while promoting success in school, employment, safety, and wellness. Our rehabilitation activities provide a great opportunity for youth to socialize as well as gain essential independent living skills to address their own needs of recovery.
"It takes a village to raise a child"
~African Proverb
|
<urn:uuid:3ac59fc8-e60b-4ec6-9eb4-659ff75d84c4>
|
CC-MAIN-2024-22
|
https://www.ocapica.org/uploads/1/3/1/1/131169935/download_the_project_focus_information_flyer_in_english.pdf
|
2024-05-19T08:18:27+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-22/subset=warc/part-00295-4dd72944-e9c0-41a1-9026-dfd2d0615bf2.c000.gz.parquet
| 836,027,066
| 346
|
eng_Latn
|
eng_Latn
| 0.72132
|
eng_Latn
| 0.951292
|
[
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
881,
1557
] |
Governor Jay Robert "J.B." Pritzker Office of the Governor 207 State House Springfield, IL 62706
December 9, 2019
Dear Governor Pritzker,
As evangelical Christians from throughout the state of Illinois, we're writing to urge you to allow refugees to continue to be resettled to Illinois through the U.S. refugee admissions program. Under an executive order signed by President Trump in September, resettlement will happen only in states and localities whose leaders provide written consent to allow refugees to be resettled in the state/locality. Illinois evangelical churches and ministries have been active in serving newly arrived refugees for decades, and we pray you will not restrict the ability for us to love our global neighbors in this way.
Over the past decade, roughly 20,800 individuals from various countries have been resettled in Illinois. Many refugees resettled by the U.S. refugee resettlement program are Christians or other religious minorities who were persecuted for their faith in countries without our country's constitutional commitment to religious freedom. Others were persecuted for their political opposition to authoritarian regimes or because of their ethnicity. Regardless of their background, refugees are human beings made in God's image, with inherent dignity and potential, and we have been blessed by their arrival in Illinois; we desire to continue to be able to extend love to these new neighbors as an exercise of our Christian faith.
Refugees resettled by the U.S. State Department are lawfully present in the U.S. from the moment of their arrival. Each one undergoes a thorough vetting process abroad before being approved for resettlement; in fact, the vetting process for refugees is the most thorough screening our federal government has for any category of immigrant or visitor coming to the U.S.. The vetting process is remarkably successful: since the Refugee Act of 1980, no refugee resettled to the U.S. has taken a single American life in an act of terrorism. We can be secure and compassionate in welcoming refugees.
Refugees also play an important role in Illinois' economy. With a remarkably low statewide unemployment rate of just 4.0%, labor shortages pose a significant threat to ongoing economic growth. Refugees are employment authorized from the day they arrive and are eager to embrace the dignity of work, a right that was generally denied them in the countries from which they came. Various studies have found that, in the long-term, refugees contribute significantly more in tax revenues than they cost taxpayers in the form of initial resettlement assistance or public benefits. Refugees also make significant contributions to local economies in that they have a particularly high rate of entrepreneurship, higher than other immigrants and the nativeborn population.
Furthermore, if refugees are no longer allowed to be resettled to Illinois, it would disrupt the reunification of many families who have been waiting years to be reunited. Many refugees are resettled to Illinois because they already have family members in the state. If Illinois restricts their resettlement, many will likely exercise their lawful right to simply move to Illinois immediately after being resettled in another state so as to join their family – but in doing so, they
will move away from vital employment assistance, language acquisition and cultural adjustment resources offered by their resettlement organization. Refugees can best integrate into the U.S. and quickly become financially self-sufficient when supported both by their family and by a local resettlement office.
As our state's governor, we urge you to keep the option open for local communities within Illinois to continue to receive newly arrived refugees. As always, we are committed to praying for you as you lead our state.
Sincerely,
Rev. Beth Cossin, Network Pastor, Heritage Church, Moline
Rev. Michael McAleese, Aurora
Rev. Jeremy Van Kley, Church of the Nazarene, Bourbonnais
Kari Alderson, Gathering Point, Kankakee
Angelina Alfaro, Social Worker, Beach Park
Joshua Anderson, Pastor, Redeemer Community Church, Aurora
Cassie Appleton, River Valley Christian Fellowship, West Chicago
Jamie Aten, Founder & Executive Director, Humanitarian Disaster Institute, Wheaton
Chelsea Bair, Decatur
Jennifer Bishop, First Free Evangelical Church of Chicago, Evanston
Hannah Bonifacius, New Life, Chicago
Sasha Brady, Highpoint Church, Wheaton
Sasha Brady, Wheaton
Rita Briggs, Pastor, Nazarene, Monticello
Jonathan Brooks, Pastor, Canaan Community Church, Chicago
Deidria Cantwell, Rockton
Lynn Catanus, Garden City Covenant Church, Chicago
Alison Chino, Rock Island
Jennifer Clark, Meal Ministry Coordinator, Redeemer Fellowship, Batavia
Wendy Cordero, Chicago
Isaiah Crowl, Catlin Church of Christ, Belgium
Roger Curless, Aurora
David Davis, Consultant, The Evangelical Alliance Mission, Winfield
Jill DeHaven, Christ Community Church, Sycamore
Johanna DeHaven, Cornerstone Anglican Church, Sycamore
Cindy Derry, Lisle
John Dingler, Trinity Presbyterian Church, Downers Grove
Owen Enoch, Wellspring Alliance Church, Wheaton
Josh Fenska, Senior Pastor, Redeemer Community Church, Aurora
Cyndi Fusek, Children and Youth Specialist, World Relief, Aurora
Lindsey Goetz, Children's Discipleship Coordinator, First Presbyterian Church of Aurora
Emily Gray, Sr. Vice President, World Relief, Chicago
Dena Griswold, The Journey, Fairfield
Judi Haugen, Wheaton
Ami Hileman, Wheaton College Graduate School, Bloomington
Shelley Hiller, Batavia
Elizabeth Houser, St. Judes, Peoria
Diane Jerdan, Immanuel Presbyterian Church, Warrenville
Dana Jewett, Willow Creek Community Church, La Grange Park
Fawn Julsaint, The Mission Church of the Nazarene, Chicago
Stephen Kafkas, Church of the Resurrection, Wheaton
Jeff Kersten, Vineyard Christian Church of Evanston, Des Plaines
Ellie Koranek, East White Oak Bible Church, Carlock
Daniel La Spata, Alderman, New Community Covenant Church, Chicago
Marchello Michaud, Morton Grove
Jeff Moore, Pastor, First Presbyterian Church, Aurora
Sadie Murbarger, Worship Arts Resident, Eastview Christian Church, El Paso
Kaly Nyathi, New Life, Chicago
Diane O'Neill, Chicago
Ina Osborn, United Methodist, Woodridge
Karl Ostroski, Grace and Peace Church, Chicago
Chrissy Palmerlee, Director of Ministry Services, Evangelical Covenant Church, Chicago
Mandy Poplawski, Mundelein
Ann Powers, Woodridge
Ruby Reveles, Trinity Church of the Nazarene, Montgomery
Stephanie Roberts, First Free Church, Chicago
Karen Romanovich, Glen Ellyn
John Ross, Aurora Christian Ministry Network, Batavia
Sarah Rubio, Elgin
Joseph Rumenapp, Methodologist, Concordia University-Portland, Chicago
Brittany Ryswyk, Lake Bluff
Kevin Sampson, Pastor, Renewal Church, West Chicago
Dr. Nathan Schau, Grayslake
John Schirle, Decatur
Alan Seaman, Chair, Applied Linguistics and International Education Department,
Wheaton College, Wellspring Alliance Church, West Chicago
Shawn Smith, Lincoln
Brittany Smith, Geneva
Matthew Soerens, US Director of Church Mobilization, World Relief, Aurora
Zachary Stallard, Location Pastor, Cornerstone Anglican Church, Chicago
Leslie Starasta, Lincoln
Christine Williams, World Relief DuPage/Aurora, Wheaton
Roxann Witt, Village Baptist, Plainfield
David Wood, Ministries Pastor, Village Bible Church, Aurora
Paul Zigterman, Lombard Christian Reformed Church, Villa Park
|
<urn:uuid:befe4489-3eea-4274-8a33-74b804ef93b9>
|
CC-MAIN-2024-46
|
https://evangelicalimmigrationtable.com/wp-content/uploads/2019/12/governor-jb-pritzker-eit.wr-letter.pdf
|
2024-11-15T04:07:19+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-46/subset=warc/part-00101-65a16d46-7179-4f3c-849a-3216b203b23b.c000.gz.parquet
| 211,671,320
| 1,647
|
eng_Latn
|
eng_Latn
| 0.655871
|
eng_Latn
| 0.96117
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3322,
5630,
7493
] |
NATCA Members Celebrate Union Solidarity & Pride
NATCA members across the country celebrated Labor Day in various ways, from the annual Labor Day parade in Milford, N.H., to Labor Festivals in Indianapolis and other locations. [View photo album](#).
NATCA's Boots On The Ground members also were active on Labor Day weekend. Pictured at right at the Northern Virginia Labor Federation's Labor Day picnic, from left to right, are Boots On The Ground Program Manager Tom Thompson, Virginia Senator Tim Kaine, and Boots member Steve Mendenhall. [View Boots On The Ground photo album](#).
HAPPY 18TH NATCA ANNIVERSARY AIRPORTS DIVISION!
The Airports Division (ARP), which joined the NATCA family officially on Aug. 31, 2000, comprises a variety of aviation professionals that include program managers, community planners, environmental protection specialists, airport certification inspectors, attorneys, financial experts, compliance specialists, engineers, and pilots. There are many bargaining unit employees who are former airport managers, and former airport operations managers, as well as public relations practitioners, and program specialists. There is great diversity in the backgrounds of the unit's employees.
ARP employees manage the $3.2 billion Airport Improvement Grant Program (AIP) and the Passenger Facility Charge (PFC) Program. NATCA's National ARP Rep Brad Davidson (right) says their biggest problem is the stop-and-go funding of the FAA. It impacts all ARP employees year after year. When funding is extended instead of passed in a full funding bill, the resulting multiple grant cycles result in more work for ARP employees. Read more
CFS 2018: SPEAKERS SPOTLIGHT
Paul Dye
Paul Dye has over 40 years of aviation experience as an engineer, builder, and pilot. His experiences have ranged from restoring old light aircraft to planning and leading manned spaceflights. For 33 years, he worked in increasingly responsible roles within the U.S. (NASA) Manned Space Program, as a technical expert in spacecraft systems and, eventually, as the overall lead of many missions to space. He retired from NASA in 2013 as the longest-serving Flight Director in U.S. history.
Dye will be speaking on Wednesday, Oct. 24. [Read more]
FAA Acting Administrator Dan Elwell
Dan Elwell is the Acting Administrator of the Federal Aviation Administration (FAA). Previously, Elwell was FAA Deputy Administrator. He also was a commercial pilot for 16 years with American Airlines, flying DC-10, MD-80, and B-757/767 aircraft.
Elwell retired from military service as a Command Pilot with more than 6,000 hours combined civilian and military flight time in the U.S. Air Force and U.S. Air Force Reserve, including combat service during Operation Desert Storm.
Elwell will be speaking on Tuesday, Oct. 23. [Read more]
CFS 2018: 14TH ANNUAL ARCHIE LEAGUE MEDAL OF SAFETY AWARDS, WINNERS' SPOTLIGHT
Central Region: Josh Giles (ZKC)
When a Denver Center (ZDV) air traffic controller called 11-year veteran Kansas City Center air traffic controller Josh Giles at the start of the midnight shift of Nov. 22, 2017 to advise of an aircraft about to enter Giles’s Prairie Area Sector 66 position, the only thing Giles knew for sure from his ZDV colleague was that the aircraft was having electrical problems.
"OK, we'll figure it out," Giles told the ZDV controller. While he continued to handle other traffic in his airspace, he went to work providing immediate assistance to this aircraft. The situation for the aircraft soon got worse. Much worse. Read more
New England Region: Jesse Belleau, Joshua Laplante (A90)
On Oct. 23, 2017, Cape Air Flight 21 took off from Augusta, Maine, headed for Boston. The flight was interrupted when the crew reported a fire in the dome light in the cockpit of the Cessna 402. They declared an emergency to Boston TRACON. "We need immediate landing. Smoke in the cockpit. Fire confirmed," was the ominous report over the frequency.
NATCA members Jesse Belleau and Joshua Laplante immediately began to assess the situation and the available options. [Read more]
**ATCA BLUE SKIES CONFERENCE**
NATCA Discusses Operational Procedures for the Future
NATCA Director of Safety and Technology Jim Ullmann participated on a panel at the Air Traffic Control Association's Blue Skies conference in Washington, D.C., Sept. 6, focusing on the future of the National Airspace System (NAS) and discussed how operations will shape the next phase of modernization. [Read more]
FACILITY SPOTLIGHT: Wilmington, Del., ATCT (ILG)
Wilmington, Del., ATCT (ILG) was commissioned in 2001, but the old tower can still be seen attached to the terminal building as visitors drive past the airport on DuPont Highway. ILG has the distinction of being the only FAA air traffic facility located in the state of Delaware.
The facility has 12 NATCA members, nine of which are Certified Professional Controllers (CPCs), and three developmental trainees. ILG has seen a renaissance in Union activism over the last few years, with increasing ILG member participation at NATCA local, regional, and national events.
Read more
MEMBER SPOTLIGHT: ZHU Member Dustin Newell Takes Love of Aviation to New Heights
The aviation bug bit Houston Center (ZHU) member Dustin Newell at a very young age - 5 or 6 by his estimation - and it's never let go over these past 35 years. In fact, he says, his love of flying has grown even stronger.
Next month will mark Newell's 10th anniversary of being an air traffic controller. He spent all of that time at ZHU. It's also the 26th anniversary of his first flight at age 14. He spends much of his time away from the facility with service through aviation, including flying for Pilots for Patients, and volunteering at events including last July as part of the team of NATCA members who worked with pilots, kids, and attendees at the Experimental Aircraft Association's annual AirVenture in Oshkosh, Wis.
Read more
ROLLING LOBBY WEEK, WASHINGTON, D.C.
NATCA Activists Hit the Hill to Urge Action on Funding, FAA Reauthorization Before Sept. 30 Deadlines
This week, a group of NATCA legislative activists from around the country came to Washington, D.C., for a Lobby Week with the goal of educating members of Congress and their staffs about the need to prevent both a government shutdown and a lapse in FAA authorization. Both issues carry a Sept. 30 deadline for action.
Pictured (from left to right) are Anthony Schifano (Charlotte ATCT, CLT), South Carolina Congressman Tom Rice, and Matt Trimble (Columbia, ATCT, CAE). For more coverage of these
special Lobby Weeks in September, please read our next NATCA Legislative Update on Sept. 14, to be delivered to you via email.
**NATCA FAMILY MEMBERS JOIN NATIONAL OFFICE STAFF**
**Dean Iacopelli Named Chief of Staff**
Dean Iacopelli has been chosen to fill the new NATCA National Office Chief of Staff position, effective immediately. Many NATCA members and staff are very familiar with Dean as a result of his long service as a NATCA member and activist. Dean recently retired from the FAA, and he also just concluded a three-year term of office as the NATCA Regional Vice President for the Eastern Region. Prior to that, Dean was NATCA Alternate Regional Vice President for the Eastern Region and a long-serving NATCA Facility Representative at New York TRACON (N90). Dean brings a wealth of knowledge and expertise about air traffic control, NATCA, and the aviation industry to his new role. We're excited to have him on board at the National Office.
**Brandi Teel New Editor of NATCA Insider**
Brandi Teel joined the National Office staff this week as the new Public Affairs Specialist. While Brandi will have many member communications responsibilities, she will be the editor of this publication, the *NATCA Insider*. Brandi brings a high level of communications and public affairs expertise with her to NATCA. Brandi was the Mission Support Manager at RTCA for the past few years where she worked on RTCA's publications, website, and awards programs. Brandi also is married to NATCA member and legislative activist Jamaal Teel from Washington Dulles ATCT. We look forward to her contributions to the NATCA Public Affairs Department.
**NATCA NEWS AND NOTES**
Mike Robicheau Honored for 12 Years as NNE RVP
NATCA President Paul Rinaldi and Executive Vice President Trish Gilbert recognized Mike Robicheau at the end of his 12-year leadership of the New England Region as its Regional Vice President. They presented Robicheau with the Tim Haines Memorial Award of Honor and Distinction, otherwise known as the "Timmy Award."
"It has been a great privilege to serve our great Union as the New England Regional Vice President over the past 12 years," Robicheau said. "I truly appreciate this recognition and want to thank all my brothers and sisters that have inspired me as we all worked to improve the working conditions of our NATCA members."
In other NATCA news, MLU and BGM successfully transitioned to STARS. Read more and view photos from both facilities.
REFLECTIONS ON THE LIFE OF BARRY KRASNER
Ed Mullin, NSW RVP, 1986-94: 'His Mark on NATCA, and on the People Involved, Is Truly Indelible'
Mullin: "I dearly valued our long discussions on forming NATCA, and what we were all trying so hard to achieve. We knew that we were standing on the shoulders of all those who came before. We were trying desperately to create something meaningful, and something that would last, something that would really benefit real people. Barry shared a keen love and respect for the job, and most especially, for the people who did the job."
"Barry Krasner was most certainly the man for our season, in the late 80s and early 90s. His mark on NATCA, and on the people involved, is truly indelible, and one that his wife and his family can revisit often, with so many, and with immeasurable pride." Read more
NATCA BENEFITS SPOTLIGHT: Ford X-Plan
NATCA has teamed up with Ford to offer NATCA members, retirees, and household members impressive savings through the Ford X-Plan. NATCA members can take advantage this great NATCA benefit and enjoy exclusive savings that are not available to the general public. No negotiating is needed. Members pay one low price, which includes the X-Plan savings in addition to most other publicly-offered programs. The program is extremely easy to use. Just click here to find information on the program, the discount code, and simple steps for how to participate. If you need help logging in to the members side of natca.org to view the X-Plan page, visit portal.natca.net.
NATCA STORE ITEM OF THE WEEK: Doormat
Try the NATCA doormat to welcome guests to your home. Features of this product: Olefin fiber rug, indoor/outdoor functionality, gray color, NATCA logo in pre-dyed red nylon flock fibers, non-skid vinyl backing, 1-inch tapered vinyl border. Whether you need extra cover on your patio, or high-traffic area in your home, this rug will work for you. Union made in the USA. Price: $25.
For more information and ordering: Please click here. Select USPS or UPS as your shipping preference on your orders. To check on stock availability or for further assistance, call 800-266-0895 or email [email protected].
FAA WORK/LIFE SOLUTIONS:
'Step into Sports' CafeWell All Agency Team Challenge
The FAA is announcing its Step into Sports Step All-Agency Team Challenge starting Sept. 18. Step into Sports is a fun way to get active with your co-workers while exploring sporting events from around the world including the World Series, World Cup, Ping Pong, and Skijoring. Join or start your own team for some healthy competition among your co-workers. Each member of the team with the highest average step count at the end of the four-week challenge wins a $100 Amazon.com gift card. Start registering your team beginning Sept. 11 for one week of warm-up. [Read more]
STAY CONNECTED ON SOCIAL MEDIA:
For questions and requests, please contact NATCA's Public Affairs Department.
|
b32a3a1f-05fd-413c-b948-1134a1ba31c6
|
CC-MAIN-2023-40
|
https://www.natca.org/wp-content/uploads/2023/02/NATCA-Insider_-Celebrating-Union-Pride-Solidarity-on-Labor-Day-Sept-8.pdf
|
2023-10-03T07:41:10+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-40/subset=warc/part-00172-7aa0a1e5-33a6-434b-89a2-950f294b40c1.c000.gz.parquet
| 967,755,781
| 2,684
|
eng_Latn
|
eng_Latn
| 0.995041
|
eng_Latn
| 0.99702
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
586,
1690,
2823,
3620,
4504,
5217,
6599,
8272,
9648,
11346,
12032
] |
By: Senators Lee, Patterson, and Rosapepe
Introduced and read first time: January 27, 2020
Assigned to: Finance
A BILL ENTITLED
AN ACT concerning 1
EXPLANATION: CAPITALS INDICATE MATTER ADDED TO EXISTING LAW.
[Brackets] indicate matter deleted from existing law.
1
2
SECTION 1. BE IT ENACTED BY THE GENERAL ASSEMBLY OF MARYLAND,
That Section(s) 13–301(14)(xxiii) through (xxxiii), respectively, of Article – Commercial
SENATE BILL 443
ASSEMBLE A CONNECTED DEVICE ON THAT PERSON'S BEHALF. 1
SENATE BILL 443
|
<urn:uuid:6b5a4e5c-ea9c-437e-8517-c17183214a7c>
|
CC-MAIN-2025-08
|
https://mgaleg.maryland.gov/2020RS/bills/sb/sb0443f.pdf
|
2025-02-18T06:29:28+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2025-08/subset=warc/part-00276-b184e832-acd1-425a-bab7-895830f2748a.c000.gz.parquet
| 357,493,390
| 152
|
eng_Latn
|
eng_Latn
| 0.558005
|
eng_Latn
| 0.728762
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
268,
428,
501,
518
] |
ABSTRACT
BACKGROUND
The aim of my study is to determine the correlation between serum albumin on admission and the functional outcome at 90 days.
METHODOLOGY
The study included 100 patients of CT-brain proven ischemic strokes admitted in the general medicine ward. Serum albumin was measured in these patients and the functional outcome at 90 days was graded using modified rankin scale.
RESULTS
At the end of the study, we came to the conclusion that serum albumin was an independent prognostic indicator of ischemic stroke and was statistically significant in correlating with the functional outcome at 90 days.
CONCLUSION
In a low resource country like ours, serum albumin is a low cost investigation that can predict the stroke outcome.
KEY WORDS
Ischemic stroke, serum albumin, prognostic indicator
|
<urn:uuid:7f3c9275-3bcf-47ad-b6a3-788881830171>
|
CC-MAIN-2020-40
|
http://repository-tnmgrmu.ac.in/11229/2/200100719aakash_chozakade_abstract.pdf
|
2020-09-27T04:37:27+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-40/subset=warc/part-00178-50bb8e61-7c5b-4d2c-bd34-dad6ca92b697.c000.gz.parquet
| 111,335,242
| 168
|
eng_Latn
|
eng_Latn
| 0.996113
|
eng_Latn
| 0.996113
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
813
] |
Chimney Corner Hotel Wedding Packages
The Classic Chimney Corner Package
Red Carpet on Arrival
Champagne and Strawberries on Arrival for the Bride and Groom
Sparkling Wine Toast
4 Course Wedding Banquet
Jugs of Iced Water on all Guest Tables
White Linen Tablecloths and Napkins
Cake Stand and Knife
Personalised Table Plan
Dedicated Wedding Team throughout the planning of your Special Day
Dedicated Master of Ceremonies
Bridal Suite on the night of the Wedding for Bride and Groom with Full Irish Breakfast
Discounted Accommodation Rates for Wedding Guests
Wedding Banquet
Starters
Soup of your Choice accompanied by a Freshly Baked Crusty Roll
Fan of Melon with a Ginger and Orange Syrup & Fresh Berries
Main Course
Roast Breast of Chicken wrapped in Bacon, pocketed with Homemade Stuffing Co. Antrim Turkey & Ham with Stuffing, Chipolatas and Red Cranberry Jus Slow Roast Daube of Beef with Shallot and Red Wine Jus (All of the above are served with Chef's Selection of Vegetables and Potatoes)
Dessert
Profiteroles served with a Duo of Chocolate Sauce Lemon Tart served with Fresh Berries Strawberry Cheesecake with a Fruit Coulis
Tea and Coffee
Please choose one Starter, one Main Course and one Dessert from the above options All Packages include up to 80 guests – additional guests are charged at 1% of the Package Price *Friday and Saturday Weddings will incur Room Hire charge of £750
The Deluxe Chimney Corner Package
Red Carpet on Arrival
Champagne and Strawberries on Arrival for the Bride and Groom
Sparkling Wine Reception
Sparkling Wine Toast
4 Course Wedding Banquet
2 Bottles of House Wine per Table
Jugs of Iced Water and Orange Juice on all Guest Tables
White Linen Tablecloths and Napkins
Cake Stand and Knife
Personalised Table Plan
Dedicated Wedding Team throughout the planning of your Special Day
Dedicated Master of Ceremonies
Bridal Suite on the night of the Wedding for Bride and Groom with Full Irish Breakfast
Discounted Accommodation Rates for Wedding Guests
Wedding Banquet
Starters
Soup of your Choice accompanied by a Freshly Baked Crusty Roll
Fan of Melon with a Ginger and Orange Syrup & Fresh Berries
Main Course
Roast Breast of Chicken wrapped in Bacon, pocketed with Homemade Stuffing
Co. Antrim Turkey & Ham with Stuffing, Chipolatas and Red Cranberry Jus
Roast Irish Sirloin of Beef served on a bed of Caramelised Mash with a Red Wine & Thyme Jus
(All of the above are served with Chef's Selection of Vegetables and Potatoes)
Dessert
Profiteroles served with a Duo of Chocolate Sauce
Lemon Tart served with Fresh Berries
Strawberry Cheesecake with a Fruit Coulis
Tea and Coffee
Please choose one Starter, one Main Course and one Dessert from the above options All Packages include up to 80 guests – additional guests are charged at 1% of the Package Price *Friday and Saturday Weddings will incur Room Hire charge of £750
The Luxury Chimney Corner Package
Red Carpet on Arrival
Champagne and Strawberries on Arrival for the Bride and Groom
Sparkling Wine Reception with a Selection of Sandwiches
Sparkling Wine Toast
4 Course Wedding Banquet chosen by the Bride and Groom from the Banqueting Selector
2 Bottles of House Wine per Table with a Top Up
Jugs of Iced Water and Orange Juice on all Guest Tables
White Linen Tablecloths and Napkins
Room Dressing by one of our Dedicated Stylists including Chair Covers, Centrepieces and Fairylight Backdrop
Cake Stand and Knife
Personalised Table Plan
Dedicated Wedding Team throughout the planning of your Special Day
Dedicated Master of Ceremonies
Bridal Suite on the night of the Wedding for Bride and Groom with Full Irish Breakfast
Evening Buffet
Selection of Sandwiches, Cocktail Sausages, Sausage Rolls, Chicken Goujons, Fish Bites, Tea/Coffee
Discounted Accommodation Rates for Wedding Guests
Ceremony Room
The Chimney Corner Hotel is fully licensed to hold ceremonies in each of the following suites:-
Larne Suite
Can accommodate up to 100 guests
Lylehill Suite
Can accommodate up to 40 guests
Fergus Suite
Can accommodate up to 40 guests (Ceremony room £150 additional)
Wedding Reception room capacity
Larne Suite
Can accommodate up to 100 guests
Lylehill Suite
Can accommodate up to 40 guests
Fergus Suite
Can accommodate up to 40 guests
To enhance your chosen suite on your big day, you may wish to hire our recommended styling company. With years of experience in this field they can offer you a room decoration package that will make your suite even more breath taking… ensuring that your room is more stunning than you could ever imagine.
For a personal consultation please contact:
Wedding Belle - 07703 713315
Weddings & Events T. 028 9084 4925
|
<urn:uuid:6ce3cc46-6ef2-4bd3-a411-ffd51c0df435>
|
CC-MAIN-2020-16
|
https://www.chimneycorner.co.uk/sites/2576/wwwroot/CC4PPWedPack21Jan20.pdf
|
2020-04-06T23:42:57+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2020-16/subset=warc/part-00291-5e0433ee-fa15-4837-b2dc-d6f38301af97.c000.gz.parquet
| 865,972,721
| 1,102
|
eng_Latn
|
eng_Latn
| 0.98959
|
eng_Latn
| 0.990237
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1416,
3853,
4733
] |
A Joint Model of Orthography and Morphological Segmentation
Ryan Cotterell Tim Vieira
Department of Computer Science Center for Information and Language Processing
Johns Hopkins University, USA LMU Munich, Germany
{ryan.cotterell,[email protected] [email protected]
Abstract
We present a model of morphological segmentation that jointly learns to segment and restore orthographic changes, e.g., funniest $\mapsto$ fun-y-est. We term this form of analysis canonical segmentation and contrast it with the traditional surface segmentation, which segments a surface form into a sequence of substrings, e.g., funniest $\mapsto$ funn-i-est. We derive an importance sampling algorithm for approximate inference in the model and report experimental results on English, German and Indonesian.
1 Introduction
Morphological segmentation is useful for NLP applications, such as, automatic speech recognition (Afify et al., 2006), keyword spotting (Narasimhan et al., 2014), machine translation (Clifton and Sarkar, 2011) and parsing (Seeker and Çetinoğlu, 2015). Prior work cast the problem as surface segmentation: a word form $w$ is segmented into a sequence of substrings whose concatenation is $w$. In this paper, we introduce the problem of canonical segmentation: $w$ is analyzed as a sequence of canonical morphemes, based on a set of word forms that have been “canonically” annotated for supervised learning. Each canonical morpheme $c$ corresponds to a surface morph $s$, defined as its orthographic manifestation, i.e., as the substring of $w$ that is generated by applying editing operations like insertion and deletion. Consider the following example: funniest has a canonical segmentation fun-y-est with three morphs funn-i-est. Arriving at the canonical analysis requires two edit operations: delete $n$ in funn and replace $i$ with $y$ in $i$. Figure 1 gives examples of orthography (i.e., the concatenation of surface morphs), underlying form (i.e., the concatenation of canonical morphemes) and canonical segmentation in three languages.
Canonical segmentation is motivated in the following three ways: (i) Computational morphology is the study of how words and their meanings are composed from smaller units. This goal is better supported by canonical morphemes than by surface morphemes because the smaller units are more accurately modeled. For funniest, composition can reason with canonical morphemes fun and y, whereas surface segmentation must work with funn and i. (ii) Morphological analysis is typically done with attribute-value pairs (AVP), e.g., [lemma=FUNNY, degree=SUPER]. While AVP is a good representation for inflectional morphology, it is not powerful enough for derivational morphology. If we represent the derivation of funnier as [lemma=FUN, deriv-suffix=-Y, degree=SUPER], then it is no longer clear in this fixed representation whether...
degree = SUPER applies to fun or fun+y.\footnote{Note that funnest is a word of (colloquial) English.} Canonical segmentation is more flexible—allowing us to express derivational relations without committing to a fixed attribute-value structure, which are used to study inflection. This point is important due to the fundamental distinction between the creation of words through inflection vs. through derivation. Inflection alters words to express syntactic relations (e.g., tense) with no major change in meaning nor POS. For example, perturbed and perturbs are inflections of the verb perturb. On the other hand, derivation modifies words more drastically—often changing the meaning or POS. For example, the noun perturbation derives from the verb stem perturb and the suffix ation (Haspelmath and Sims, 2013). (iii) Most NLP systems take word forms as atomic building blocks. We propose canonical morphemes, an alternative representation that models the structure of a language’s lexicon and supports applications that benefit from access to the internal structure of words. This includes access to internal morphological structure, e.g., canonical morphemes like -y and -ly are recognized (independent of their orthographic manifestation) as derivational suffixes that cause predictable modifications; as well as access to internal semantic structure, e.g., the canonical segmentations of fun and funny share the canonical morpheme fun).
The contributions of this paper are as follows. We present the challenging new task of canonical segmentation. We develop a feature-rich structured joint model for canonical segmentation, which accounts for orthographic variation and segment-level structure. We derive an efficient importance sampling algorithm for approximate inference. We present experiments on three languages: English, German and Indonesian.
2 Model, Inference and Training
Our goal is canonical segmentation: identifying both the canonical morphemes and the morphs (their orthographic manifestations) of a word. This task involves segmenting the input as well as accounting for orthographic changes occurring in the word formation processes. Let $w$ be the surface form, $u$ the orthographic underlying representation (UR) of $w$, and $s$ a labeled segmentation of $u$. Note: all random variables are string-valued (Dreyer and Eisner, 2009). For example, consider the word unhappiness:
\[
\underbrace{\text{unhappiness}}_{w} \xrightarrow{\text{transduction}} \underbrace{\text{unhappyness}}_{u}
\]
\[
\xrightarrow{\text{segmentation}} [\text{prefix un}][\text{stem happy}][\text{suffix ness}].
\]
Note that our notion of an orthographic UR closely resembles the phonological concept of a UR (Kenstowicz, 1994) and, indeed, many orthographic variations are manifestations of phonology.
We model this process as a globally normalized log-linear model of the conditional distribution,
\[
p(s, u \mid w) = \frac{1}{Z(w)} \exp \left( \eta^\top f(s, u) + \omega^\top g(u, w) \right),
\]
where $\theta = \{\eta, \omega\}$ are the model parameters, $f$ and $g$ are, respectively, feature functions of the segmentation-UR and UR-surface-form pairs and $Z(w) = \sum_{s', u'} \exp \left( \eta^\top f(s', u') + \omega^\top g(u', w) \right)$ is the partition function. We can view this model as a conjunction of a finite-state transduction factor $g$ (Dreyer et al., 2008) and a semi-Markov segmentation factor $f$ (Sarawagi and Cohen, 2004), relating it to previous semi-CRF models of segmentation.\footnote{Our transduction factor maps surface forms $w$ to UR strings $u$ of bounded length by imposing an insertion limit $k$. Thus, $|u| \leq |w| + k$. Our experiments use $k = 5$.} To fit the model, we maximize the log-likelihood of the training data $\{(s_i, u_i, w_i)\}_{i=1}^N$, $\mathcal{L}(\theta) = \sum_{i=1}^N \log p(s_i, u_i \mid w_i)$, with respect to the model parameters $\theta$. Optimization is done with gradient-based methods—requiring the computation of $\log Z(w)$ and $\nabla \log Z(w)$, which is intractable.\footnote{Since the semi-CRF features fire on substrings, we would need a dynamic programming state for each substring of each of the exponentially many settings of $u$.} Thus, we turn to sampling (Rubinstein and Kroese, 2011) and stochastic gradient methods.
Features Our model includes several simple feature templates. The transduction factor of the model is based on (Cotterell et al., 2014): we include features that fire on individual edit actions as well as conjunctions of edit actions and characters on the surrounding context. For the semi-Markov factor, we use the feature set of Cotterell et al. (2015a), which
includes indicator features on individual segments, conjunctions of segments and segment labels and conjunctions of segments and left and right context on the input string. We also include a feature that checks whether the segment is a word in ASPELL (or a monolingual corpus).
**Importance Sampling** To approximately compute the gradient for learning, we employ importance sampling (MacKay, 2003, pp. 361–364). Rather than considering all underlying orthographic forms $u$, we use samples taken from proposal distribution $q$—a distribution over $\Sigma^*$. In the following equations, we omit the dependence on $w$ for notational brevity. Also, let $\mathbf{h}(s, u) = \mathbf{f}(s, u) + \mathbf{g}(u, w)$. We now provide the derivation of our importance sampling estimate for the gradient of log-partition function, including Rao-Blackwellization (Robert and Casella, 2013).
\[
\nabla \log Z = \mathbb{E}_{(s, u) \sim p} [\mathbf{h}(s, u)] \\
= \sum_{s, u} p(s, u) \mathbf{h}(s, u) \\
= \sum_{s, u} p(s|u)p(u) \mathbf{h}(s, u) \\
= \sum_{u} p(u) \sum_{s} p(s|u) \mathbf{h}(s, u) \\
= \sum_{u} p(u) \mathbb{E}_{s \sim p(\cdot|u)} [\mathbf{h}(s, u)] \\
= \mathbb{E}_{u \sim q} \left[ \frac{p(u)}{q(u)} \mathbb{E}_{s \sim p(\cdot|u)} [\mathbf{h}(s, u)] \right].
\]
The expectation $\mathbb{E}_{s \sim p(\cdot|u)} [\mathbf{h}(s, u)]$ is efficiently computed with the semi-Markov generalization of the forward-backward algorithm (Sarawagi and Cohen, 2004). The algorithm runs in $\mathcal{O}(n^2 \cdot t^2)$ per sample where $n$ is the length of the string to be segmented and $t$ is the size of the label space. In our case, we have three labels: prefix, stem and suffix so $t = 3$.
So long as $q$ has support everywhere $p$ does (i.e., $p(u) > 0 \Rightarrow q(u) > 0$), the estimate is unbiased. Unfortunately, we can only efficiently compute $p(u) \propto \sum_s \exp(\theta^\top \mathbf{h}(s, u))$ up to constant factor, $p(u) = \bar{p}(u)/Z_u$. Thus, we use the *indirect importance sampling estimator*,
\[
\frac{1}{\sum_{i=1}^{m} \bar{p}(u^{(i)})} \sum_{i=1}^{m} \frac{\bar{p}(u^{(i)})}{q(u^{(i)})} \mathbb{E}_{s \sim p(\cdot|u^{(i)})} \left[ \mathbf{h}(s, u^{(i)}) \right],
\]
where $u^{(1)} \ldots u^{(m)} \overset{i.i.d.}{\sim} q$. The indirect estimator is biased, but statistically consistent.\footnote{Informally, the indirect importance sampling estimate converges to the true expectation as $m \to \infty$.} We also note that the particular instantiation of the indirect estimator leverages an efficient dynamic program to compute the expected features under $p(\cdot|u^{(i)})$. This has the effect of decreasing the number of samples required to get a useful estimate of the gradient. Computing $\bar{p}(u^{(i)})$ is a side effect of the dynamic program, namely the normalization constant. As a proposal distribution $q$, we use the following locally normalized distribution,
\[
q(u) = \frac{\exp(\omega^\top g(u, w))}{\sum_{u'} \exp(\omega^\top g(u', w))}.
\]
### 3 Related Work
Most work on morphological segmentation has been unsupervised. The LINGUISTICA (Goldsmith, 2001) and MORFESSOR (Creutz and Lagus, 2002) models rely on the minimum description length principle (Cover and Thomas, 2012). In short, these methods seek to segment words while at the same time minimizing the number of unique morphs discovered, i.e., the complexity of the model. The MORFESSOR model has additionally been augmented to handle the semi-supervised scenario (Kohonen et al., 2010). Goldwater et al. (2009) proposed a Bayesian non-parametric approach to word and morphological segmentation. Poon et al. (2009) used contrastive estimation (Smith and Eisner, 2005) to learn a log-linear model for segmentation fully unsupervised.
Few supervised techniques have been applied to morphological segmentation. Ruokolainen et al. (2013) applied a linear-chain CRF, showing that with a minimal amount of labeled data the performance of standard unsupervised and semi-supervised baselines are surpassed. In follow-up work (Ruokolainen et al., 2014), they found that incorporating distributional character-level features acquired from large unlabeled corpora improved the earlier model. Cotterell et al. (2015a) showed that modeling morphotactics with a semi-CRF improves results further.
The previously described approaches only attempt to split words into a sequence of stem and affixes—making it difficult to restore the underlying structure
which has been “corrupted” by the orthographic process. Our approach, however, is capable of restoring the underlying morphemes, e.g., *stopping* $\mapsto$ *stop-ing*. We note two exceptions to the above statement. Both Dasgupta and Ng (2007) and Naradowsky and Goldwater (2009) incorporate basic, heuristic spelling rules into *unsupervised* induction algorithms. Relatedly, Cotterell et al. (2015b) induced a phonology in an unsupervised manner. In contrast, our model is fully supervised and supports rich features, which enable accurate prediction on new words.
4 Experiments
We provide canonical segmentation experiments in three languages: English, German and Indonesian.
4.1 Corpora
The English data was extracted from segmentations derived from CELEX (Baayen et al., 1993). The German data was extracted from DerivBase (Zeller et al., 2013), which provides a collection of derived forms and the transformation rules. We manipulated these rules to create canonical segmentations. Lastly, the Indonesian data was created from the output of the MORPHIND analyzer (Larasati et al., 2011), which we ran on an open-source corpus of Indonesian.\footnote{https://github.com/desmond86/Indonesian-English-Bilingual-Corpus} For each language we selected 10,000 forms at random from a uniform distribution over types to form our corpus. We sampled 5 splits of the data into 8000 training forms, 1000 development forms and 1000 test forms. We have released all train, development and test splits online with additional documentation about their construction.\footnote{http://ryancotterell.github.io/canonical-segmentation/}
4.2 Models
We train two versions of our proposed model. First, we train a \textit{pipeline model}, i.e., we train the transduction component and segmentation component independently and decode sequentially. This approach is faster both at train and at test but suffers from cascading errors. Second, we train a \textit{joint model}, the transduction and the segmentation components are trained to work well together.
\begin{table}[h]
\centering
\begin{tabular}{l|lllll}
& Joint & Pipeline & SemiCRF & WFST \\
\hline
error & en & \textbf{0.27} (.02) & 0.33 (.01) & 0.33 (.01) & 0.63 (.00) \\
& de & \textbf{0.41} (.03) & 0.53 (.02) & 0.65 (.01) & 0.74 (.01) \\
& id & \textbf{0.10} (.01) & 0.22 (.01) & 0.27 (.01) & 0.71 (.00) \\
\hline
distance & en & 0.98 (.34) & \textbf{0.63} (.04) & 0.68 (.01) & 1.35 (.01) \\
& de & \textbf{1.01} (.07) & 1.10 (.04) & 1.32 (.04) & 4.24 (.20) \\
& id & \textbf{0.15} (.02) & 0.36 (.03) & 0.49 (.02) & 2.13 (.00) \\
\hline
$F_1$ & en & \textbf{0.76} (.02) & 0.70 (.02) & 0.68 (.01) & 0.53 (.02) \\
& de & \textbf{0.76} (.02) & 0.71 (.01) & 0.65 (.01) & 0.59 (.02) \\
& id & \textbf{0.80} (.01) & 0.75 (.01) & 0.71 (.01) & 0.62 (.02) \\
\end{tabular}
\caption{Top: Error rate. Middle: Average edit distance. Bottom: Mean morpheme $F_1$ (higher better). Standard deviation in parentheses. Best result on each line in bold.}
\end{table}
**Baseline: Semi-CRF Segmenter** The first baseline is a semi-CRF (Sarawagi and Cohen, 2004) that segments the orthographic form into morphs \textit{without} canonicalization. Earlier work by Cotterell et al. (2015a) applied this model to \textit{supervised} morphological segmentation. We use the feature set as Cotterell et al. (2015a), but we do not incorporate their augmented morphotactic state space.
**Baseline: WFST Segmenter** Our second baseline is a weighted finite-state transducer (Mohri, 1997) with a log-linear parameterization (Dreyer et al., 2008). We use the stochastic contextual edit model of Cotterell et al. (2014). We employ context $n$-gram features (up to 6-grams) on the input string to the left and right of the edit location in addition to 2-gram features on the lower string. The context features are then conjoined with the exact edit action. We refer the reader to Cotterell et al. (2014) for more details. The segmentation boundaries are marked as a distinguished symbol in the target string. This model is not entirely suited for the task as it makes it difficult to include the rich features we get through ASPELL.
**Training and Decoding Details** We train all models with AdaGrad (Duchi et al., 2011; Bottou, 2010). For the joint model, we take 10 samples ($m = 10$) for each gradient estimate. See Algorithm 3 of Bengio et al. (2003) for pseudocode for SGD with importance sampling. The pipeline and segmentation models use ordinary SGD. We use $L_2$ regularization with the regularization coefficient chosen by based on development set performance.
Exact decoding, $\argmax_{s,u} p(s,u \mid w)$, is intractable. Thus, we use a sampling approximation:
\[\arg\max_{s, u^{(i)}} p(s, u^{(i)} \mid w) \text{ where } u^{(1)} \ldots u^{(m)} \overset{\text{i.i.d.}}{\sim} q.\]
We use \(m = 1000\) in our experiments. Conditioned on each sample value for \(u\), we use exact semi-CRF Viterbi decoding to select \(s\).
### 4.3 Evaluation Measures
Evaluating morphological segmentation is tricky. The standard measure for the supervised task is border \(F_1\), which measures how often the segmentation boundaries posited by the model are correct. However, this measure assumes that the concatenation of the segments is identical to the input string (i.e., surface segmentation) and is thus not applicable to canonical segmentation. On the other hand, the Morpho Challenge competition (Kurimo et al., 2010) uses a measure that samples a large number of word pairs from a linguistic gold standard. A form is considered correct if the gold standard contains at least one overlapping morph \textit{and} the model posits at least one overlapping morph—this is problematic because for languages with multi-morphemic words (e.g., German), one should consider all morphs. Moreover, we can actually recover the linguistically annotated gold standard in contrast to unsupervised methods.
Instead, we report results under three measures: error rate, edit distance and morpheme \(F_1\). Error rate is the proportion of analyses that are completely correct. Since error rate gives no partial credit, we also report edit distance between the predicted analysis and the gold standard, where both are encoded as strings using a distinguished boundary character at segment boundaries. Finally, morpheme \(F_1\) (van den Bosch and Daelemans, 1999) considers overlap between the \textit{set} of morphemes in the model’s analysis and the set of morphemes in the gold standard. In this case, precision asks how often did the predicted segmentation contain morphemes in the gold standard and recall asks how often were the gold standard morphemes in the predicted segmentation.
### 4.4 Results and Error Analysis
Table 1 gives results for the three measures. Under error rate and morpheme \(F_1\) our joint model performs the best on all three languages, followed by our pipeline model and then the two baselines. In fact, we observe that error rate and \(F_1\) are quite correlated in general. Under edit distance, the joint model is the best model on German and Indonesian, but the pipeline model is superior on English. Error analysis indicates that the lower performance is due to spurious insertions. For example, our model incorrectly analyzes \textit{ruby} (stone) as \textit{ruble-y}, mistaking the \textit{ruby} as an adjectival form of \textit{ruble} (the Russian currency); the correct analysis is \textit{ruby} \(\mapsto\) \textit{ruby}. We believe that a richer transduction component may fix some of these problems. Overall, our joint model performs well; it is on average within one edit operation of the gold segmentation on three languages.
Unsurprisingly, the WFST performs poorly because it cannot leverage segment-level features (e.g., ASPELL features), which are available to the other models. The performance of the semi-CRF is limited by the orthographic changes in the language, which it cannot model. German is rich in such changes, hence the semi-CRF performs poorly and gets more than half the test cases wrong.
### 5 Conclusion
We presented a joint model for the task of canonical morphological segmentation, which extends existing approaches with the ability to learn orthographic changes. We argue that canonical morphological segmentation provides a useful analysis of linguistic phenomena (e.g., derivational morphology) because the sequence of morphemes is canonical—making it evident, which words share morphemes. Our model outperforms two baselines on three languages.
### Acknowledgments
This material is based in part on research sponsored by DARPA under agreement number FA8750-13-2-0017 (the DEFT program) and the National Science Foundation under Grant No. 1423276. RC was funded by a DAAD Long-Term Research Grant. HS was supported by DFG (SCHU 2246/4-2).
### References
Mohamed Afify, Ruhi Sarikaya, Hong-Kwang Jeff Kuo, Laurent Besacier, and Yuqing Gao. 2006. On the use of morphological analysis for dialectal Arabic speech recognition. In INTERSPEECH.
R Harald Baayen, Richard Piepenbrock, and Rijn van H. 1993. The CELEX lexical data base on CD-ROM.
Yoshua Bengio, Jean-Sébastien Senécal, et al. 2003.
Quick training of probabilistic neural nets by importance sampling. In *AISTATS*.
Léon Bottou. 2010. Large-scale machine learning with stochastic gradient descent. In *Proceedings of COMPSTAT’2010*, pages 177–186. Springer.
Ann Clifton and Anoop Sarkar. 2011. Combining morpheme-based machine translation with post-processing morpheme prediction. In *ACL*.
Ryan Cotterell, Nanyun Peng, and Jason Eisner. 2014. Stochastic contextual edit distance and probabilistic FSTs. In *ACL*.
Ryan Cotterell, Thomas Müller, Alexander Fraser, and Hinrich Schütze. 2015a. Labeled morphological segmentation with semi-Markov models. In *CoNLL*.
Ryan Cotterell, Nanyun Peng, and Jason Eisner. 2015b. Modeling word forms using latent underlying morphs and phonology. *TACL*, 3:433–447.
Thomas M Cover and Joy A Thomas. 2012. *Elements of information theory*. John Wiley & Sons.
Mathias Creutz and Krista Lagus. 2002. Unsupervised discovery of morphemes. In *Proceedings of the ACL-02 workshop on Morphological and phonological learning-Volume 6*, pages 21–30. Association for Computational Linguistics.
Sajib Dasgupta and Vincent Ng. 2007. High-performance, language-independent morphological segmentation. In *NAACL*.
Markus Dreyer and Jason Eisner. 2009. Graphical models over multiple strings. In *EMNLP*.
Markus Dreyer, Jason R Smith, and Jason Eisner. 2008. Latent-variable modeling of string transductions with finite-state methods. In *EMNLP*.
John Duchi, Elad Hazan, and Yoram Singer. 2011. Adaptive subgradient methods for online learning and stochastic optimization. *The Journal of Machine Learning Research*, 12:2121–2159.
John Goldsmith. 2001. Unsupervised learning of the morphology of a natural language. *Computational linguistics*, 27(2):153–198.
Sharon Goldwater, Thomas L Griffiths, and Mark Johnson. 2009. A Bayesian framework for word segmentation: Exploring the effects of context. *Cognition*, 112(1):21–54.
Martin Haspelmath and Andrea Sims. 2013. *Understanding morphology*. Routledge.
Michael Kenstowicz. 1994. *Phonology in Generative Grammar*. Blackwell.
Oskar Kohonen, Sami Virpioja, and Krista Lagus. 2010. Semi-supervised learning of concatenative morphology. In *Proceedings of the 11th Meeting of the ACL Special Interest Group on Computational Morphology and Phonology*.
Mikko Kurimo, Sami Virpioja, Ville Turunen, and Krista Lagus. 2010. Morpho Challenge competition 2005–2010: evaluations and results. In *SIGMORPHON*.
Septina Dian Larasati, Vladislav Kuboň, and Daniel Zeman. 2011. Indonesian morphology tool (morphind): Towards an Indonesian corpus. In *Systems and Frameworks for Computational Morphology*, pages 119–129. Springer.
David JC MacKay. 2003. *Information Theory, Inference and Learning Algorithms*. Cambridge University Press.
Mehryar Mohri. 1997. Finite-state transducers in language and speech processing. *Computational linguistics*, 23(2):269–311.
Jason Naradowsky and Sharon Goldwater. 2009. Improving morphology induction by learning spelling rules. In *IJCAI*.
Karthik Narasimhan, Damianos Karakos, Richard Schwartz, Stavros Tsakalidis, and Regina Barzilay. 2014. Morphological segmentation for keyword spotting. In *EMNLP*.
Hoifung Poon, Colin Cherry, and Kristina Toutanova. 2009. Unsupervised morphological segmentation with log-linear models. In *NAACL*. Association for Computational Linguistics.
Christian Robert and George Casella. 2013. *Monte Carlo statistical methods*. Springer Science & Business Media.
Reuven Y Rubinstein and Dirk P Kroese. 2011. *Simulation and the Monte Carlo method*. John Wiley & Sons.
Teemu Ruokolainen, Oskar Kohonen, Sami Virpioja, and Mikko Kurimo. 2013. Supervised morphological segmentation in a low-resource learning setting using conditional random fields. In *CoNLL*.
Teemu Ruokolainen, Oskar Kohonen, Sami Virpioja, and Mikko Kurimo. 2014. Painless semi-supervised morphological segmentation using conditional random fields. In *EACL*.
Sunita Sarawagi and William W Cohen. 2004. Semi-Markov conditional random fields for information extraction. In *NIPS*.
Wolfgang Seeker and Özlem Çetinoğlu. 2015. A graph-based lattice dependency parser for joint morphological segmentation and syntactic analysis. *TACL*.
Noah A. Smith and Jason Eisner. 2005. Contrastive estimation: Training log-linear models on unlabeled data. In *ACL*.
Antal van den Bosch and Walter Daelemans. 1999. Memory-based morphological analysis. In *ACL*.
Brüttia D Zeller, Jan Snajder, and Sebastian Padó. 2013. DErivBase: Inducing and evaluating a derivational morphology resource for german. In *ACL*.
|
<urn:uuid:836426f4-9dc3-4d06-b746-77f2819f32a1>
|
CC-MAIN-2022-21
|
https://rycolab.io/papers/cotterell+al.naacl16.pdf
|
2022-05-28T20:45:36+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-21/subset=warc/part-00290-bd7ecbba-8e15-4123-ae07-d9c98ad96845.c000.gz.parquet
| 570,467,070
| 6,588
|
eng_Latn
|
eng_Latn
| 0.941053
|
eng_Latn
| 0.966457
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
2887,
7555,
12000,
16697,
21178,
25766
] |
STEWARDS RULING
Ruling number: 15-0148
Track: Churchill Downs
Date: November 26, 2015
Jockey: Victor M. Lebron
After waiving your right to a hearing before the Board of Stewards you are hereby fined THREE HUNDRED ($300.00) DOLLARS for failure to fulfill your riding engagements at Churchill Downs on November 25, 2015. Upon receipt of this ruling, you have 30 days to pay any fine imposed by the stewards or face summary suspension of your license pursuant to 810 KAR 1:025 Section 14 (cc).
810 KAR 1:009 Section 10
By Order of the Stewards
[Signatures]
Kentucky
EQUAL OPPORTUNITY M/F/D
|
<urn:uuid:ec676101-ed59-4c9c-a47c-1eabd19ac72a>
|
CC-MAIN-2024-33
|
https://khrc.ky.gov/Documents/150148.pdf
|
2024-08-14T10:04:18+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-33/subset=warc/part-00292-4f628544-3cdf-4526-86aa-bdfa0b33cdc9.c000.gz.parquet
| 267,708,990
| 166
|
eng_Latn
|
eng_Latn
| 0.98223
|
eng_Latn
| 0.98223
|
[
"eng_Latn"
] | false
|
docling
|
[
595
] |
Impact of Land Conversion on Oil Palm Production and Income
Edison
Abstract: Objective of study was to evaluate impact of land conversion on oil palm production, evaluate its impact on income of oil palm, and explore effect of social-economic aspects to land conversion of oil palm. Research used cross section data of 200 respondents. Data was analysed using qualitative and quantitative method. Results showed that a significant factors affected oil palm production which included land acreage, labour and capital. Significant factors affected income were selling price and capital. Then, socio-economic factors affected land conversion of oil palm such as education, income and saving. It found that paddy fields are more converted to oil palm fields, in which paddy fields were more in dryland than technical irrigation. Then, in terms of farming analysis, efficiency smallholder oil palm was higher than efficiency paddy (B/C on paddy was of 1.02 and B/C on oil palm was of 1.71).
In agricultural business, production is obtained through a long and risky process. The time gap required is not the same depending on the type of commodity being cultivated. Not only time, the adequacy of production factors also contribute as a determinant of production achievement. In terms of time, the plantation business requires a longer period compared to food crops and some horticultural crops. Each type of plant also has a different periodization of each other (Edison, 2020).
Keywords: land conversion, oil palm, production, income
I. INTRODUCTION
Agricultural sector is a very crucial sector of its role in economy in most of developing countries. It can be found from role of agricultural programme in supporting people as well as providing employment opportunities to people, contributing national income and supporting to various product. Various data explored that in some developing countries over 68% of people is in agricultural sector and over 45% of national income is come from agricultural sector and almost all exports are agricultural commodity (Todaro, 2008).
Development and modernization of agriculture in developing countries can contribute to increase production, increase farmer income and provide markets for industrial sector production, expand employment opportunities, increase exports and create savings for development. Agricultural and rural development actually contains many dilemmas (Wildayana and Armanto, 2018). On the one hand agricultural production and productivity must be improved. Increased production and productivity is a must because it is the basis and prerequisite for the process of industrialization (De Vos, 2016).
If high growth rates of the agricultural sector can be achieved, changes in production structures that reduce the level of relative productivity and even then will not be avoided unless the employment structure can also be changed following changes in the production structure. In the meantime, productivity improvement should not be done by using more efficient technology, biological technology, mechanical technology and social technology. However, this technology certainly leads to savings of labour in the sector concerned (Adriani et al. 2017).
Revised Manuscript Received on February 08, 2020.
Edison,
Dept. of Agricultural Economics, Universitas of Jambi,
Indonesia. E-mail:
[email protected]
Retrieval Number: F7408038620/2020©BEIESP
DOI:10.35940/ijrte.F7408.038620
The new production process can run if the required requirements can be met, this requirement is better known as the production factor. Input contain four components, i.e. land, labour, capital, and skill or management (Daniel, 2012). Each of these factors has different functions and they are related to each other. If one factor is not available, then the production process will not run, especially the three factors mentioned above. These factors of production are something that absolutely must be available that will be more perfect if sufficiency requirements can be met. The capital production factor is partially allocated to provide the input of physical production, i.e. seeds, fertilizers and pesticides. Production input is one of the determinants of production activities, because plants need it to grow and develop well (Asni, 2015).
Production activities are activities in a rather narrow scope and therefore discuss the micro aspects. In studying this aspect, the role of input production and output (output or production) relationships gets the main concern. The role of input can not only be viewed in terms of its kind or availability in a timely manner, but also can be reviewed in terms of efficiency of its use (Alwarritzi et.al. 2015). Because of these factors the productivity gap (yield gap) between productivity and productivity produced by farmers is required. In many cases, as long as this productivity occurs because of factors that are difficult to overcome by human (farmers) such as the existence of technology that can not be moved and the existence of environmental differences, such as climate. Since these two factors are very difficult to overcome by farmers, the resulting differences caused by these two factors lead to the productivity gap from the experimental results and from the potential of a farm. (Soekartawi, 2006).
II. REVIEW OF LITERATURE
Land as one of the factors of production is a factory of agricultural products which is the place of the production process and the production is obtained. In agriculture, the factor of land production has a very important position. According to Schwarse et al. (2005), the change of function of land is the change of one land use to another, so that many problems arise related to land use policies.
Blue Eyes Intelligence Engineering
337
& Sciences Publication
Impact of Land Conversion on Oil Palm Production and Income
This transfer of land functions generally involves transformation in allocating land resources from one use to another. Change of function of agricultural land is an issue that needs attention because the community's dependence on the agricultural sector, especially food. In land conversion activities, it is very closely related to land demand and supply, where supply or supply is very limited while land demand is not limited (Krishna et al, 2016). Factors affecting land supply are natural physical characteristics, economic factors, economic factors, and institutional factors. Besides the factors that demand for land are the population, technological developments, habits and traditions, education and culture, tastes and goals, and changes in attitudes and values caused by age development (Irawan, 2012).
According to Pastusiak et al. (2017), land use change generally involves transformation in the allocation of land resources from one use to another. According to Vijay et al. (2016), changes in land use patterns are essentially permanent and can also be temporary. If the technically irrigated paddy field turns into a residential or industrial area, then land conversion can be permanent. However, if the rice fields are turned into plantations, then the conversion of land can be temporary, because in the coming year it can be turned into fields again. The conversion of permanent land functions is usually greater than the temporary transfer of function. Irawan (2012) revealed that the negative impact of the conversion of paddy land is the degradation of the carrying capacity of national food security, declining agricultural income, and increasing poverty of local communities. In addition, other impacts are the destruction of paddy ecosystems, as well as cultural changes from agrarian to urban culture, causing crime.
According Wuepper et al. (2018) that land use change that occurs has both direct and indirect impacts. The direct impacts caused by land conversion include loss of fertile agricultural land, loss of investment in irrigation infrastructure, natural damage to the landscape, and environmental problems. From the studies mentioned above, it can be seen the factors that influence the decision of farmers to switch from rice to non-paddy rice. In this study the factors that caused farmers to change their land use include the area of land owned by farmers in the study area, the adequacy of irrigation water for wetland rice, differences in revenue from rice farming with cocoa and oil palm, and trends in the development of prices for lowland rice, cocoa, and palm (Hadi, 2014). There are several causes of the high land use change including low profitability of lowland rice farming, non-compliance with spatial regulations (weak law enforcement on spatial planning), desires to get short-term benefits from the conversion of paddy land, and low coordination between institutions and departments related to use planning land (Amurtiya et al., 2016).
Land is a strategic resource and has economic value. The area of agricultural land continues to decline each year, especially paddy fields. Extensive paddy fields are very important to obtain maximum production results. But along with the land use change that occurred, the area of wetland rice has declined. In addition there are some losses that must be calculated as a negative impact of the function of rice fields, such as the loss of potential rice production, loss of employment opportunities, and the increasingly damaged environment (Saswattcha et al. 2016). Based on previous studies, in this study it is suspected that there are factors that
Retrieval Number: F7408038620/2020©BEIESP
DOI:10.35940/ijrte.F7408.038620
338
influence the decision of farmers to transfer land functions. These factors are the area of land with adequacy irrigation water, difference in revenue from rice farming with cocoa and oil palm, the tendency of the development of paddy, cocoa and palm oil prices.
III. OBJECTIVES
Objective of research was to evaluate impact of land conversion on oil palm production, evaluate its impact on income of oil palm, and explore effect of social-economic aspects to land conversion of oil palm.
IV. RESEARCH METHODS
Research method conducted using a survey method. Research area was identified purposively in Tanjab Timur District and Muaro Jambi District. Because Jambi becomes one of best production of oil palm in Indonesia. Tanjab Timur District and Muaro Jambi District had high number land conversions to oil palm in Jambi.
Cluster Sampling methods was used to identify respondents. In order to cover attentions from varies aspects, number of samples are 200 households (65 respondents on paddy farmers, 65 respondents on oil palm farmers and 70 respondents on paddy with oil palm farmers). Study was evaluated in 2019.
Cobb-Douglas production function model used in this study. Mathematically, expression of Cobb-Douglas production function model is: (Soekartawi, 2009)
Q =
I
I
.. I
v ………………… 1
1
2
m
And it can be expressed in logit form as:
1
2
m
Log Q = log
+
log I
+
log I
+ ... +
log
I
+ e …………………………………….. 2
0
1
1
2
2
m
m
Input used consists land acreage, input labour, and input capital. There are factors that affect income assumed including yield, price, input labour, and input capital. Linkage input that affects yield and income is expressed in Cobb-Douglas production function (Gujarati, 2008).
Where, Q is yield, I1 ... In are inputs component, and 1 ..... n = regression coefficient.
Cobb-Douglas production function will be used to know effect input on paddy production as: 1 2 3
Q =
I
I
I
u
………………. 3
Through logarithmic formulation, equation (3) is stated to
0
11
12
13
1
linear equation using Ordinary Least Square (OLS) method as:
Log Q
= Iog
+
log I
+
log I
+
log I
+ u
…………………………….. 4
1
0
1
11
2
12
3
13
1
Equation model that expressed paddy income is as follows:
Where, Q1 is yield, I11 is land acreage, I12 is labour, I13 is capital, and 1 - 3 = regression coefficient.
2
Log Q
= log
0
+
1
log I
21
+
2
log I
22
+
3
log
I
+
log I
+ u
……………. 5
Where, Q2 is paddy income, I21 is yield, I22 is price, I23 is input labour, I24 is input capital, 1-4 is regression coefficient.
23
4
24
2
Input model that explain oil palm yield is expressed as:
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Log Q
= log
+
1 log I
+
log I
+
log I
+ u
…………………………….. 6
3
0
31
2
32
3
33
3
Furthermore, input model that explain income of oil palm is expressed as:
Where, Q3 is oil palm production, I31 is land acreage, I32 is labour used, I33 is capital, 1-3 is regression coefficient.
4
1
41
2
42
3
43
Log Q
= log
+
log I
+
log I
+
log I
+
log I
+ u where, Q
…………………. 7
44
4
4
is oil palm revenues, I
price, I
41
42
is yield, I
is selling
43
is labour used, I
is capital,
-
is regression
coefficient.
44
1
4
Finally, equation input model that affect area paddy that convert model to oil palm plantation is as:
Log Q5 = log + 1 log I51 + 2 log I52 + 3 log I53 + 4 log I54 + 5 log I55 + 6 log I56 + u5….. 8
Where, Q5 is oil palm income, I51 is yield, I52 is price, I53 is input labour, I54 is input capital, I55 is land acreage, I56 is water availability, 1-6 is regression coefficients.
V. RESULT AND DISCUSSION
Characteristics of Respondents
Farm size. Farm size each farmer was in average 2,00 hectare, and area farming owned was generally unity in different cropping patterns. In average, farm size of rice farmers was 1,58 hectare while farm size of oil farm farmers was 1,69 hectare. With variation cultivated land, agricultural activity is classified as small farmers. In research area, respondents plant oil palm by changing their paddy in the existing land and it was not allow to extent their cultivation land only if they buy other land. Therefore, cultivated paddy area is usually little bit different from oil palm cultivated area. Land conversion from paddy to oil palm, did not cause much different in their farming land. Before farmers change to use new technology, farmers were not successful on paddy cultivation. Some of them move to do other job to look for new better life. Others leave their land to inheritance of land cultivation to their children.
Labour Use. Labour use in paddy was in averages of 27,9 workdays/cultivation season on per existing land. This is rather high because they did not use mechanization. This condition can be seen when they worked on land preparation and harvesting. If they used only human labour, it took around 25 workdays per hectare. When it used machine to harvest, it needed only around 4 hours per hectare. Mechanisation can increase farmers ability to operate their land. On research area, considering movement agricultural mechanisation, it had changed paddy farming from labour intensive to capital intensive. Mechanization has been used in land cultivation i.e. hand tractor. Doing seedling did not also used because of existing of tabela (direct seed planting without seedling method). It also used Combined harvesters for harvesting. Condition was the same as Brhanu (2018) who stated that applying mechanical technology could increase productivity significantly.
Labour on oil palm cultivation is not really different from paddy. Oil palm joining to private plantation do all activities for their activities. Oil palm used labour was only about 18 workdays for every 6 months for 2 ha. Therefore, farmers' leisure time is high, allowing farmers to work on other activities. Result was the same as Krishna et al. (2016) expressed that oil palm needed few labour than rubber plant which became one of crucial plants.
Retrieval Number: F7408038620/2020©BEIESP
DOI:10.35940/ijrte.F7408.038620
339
Agricultural Production Costs.
In traditional paddy farming, some costs are linkage labour costs from preparation till harvest. Meanwhile, improvement in paddy cultivation using machinery, paddy becomes more expensive. Production costs paddy was 2 million IDR/ha/year per planting season. It covered fertiliser costs (26%), land processing and harvest costs (74%). Furthermore, cost on oil palm is about 3 million IDR/ha/year. It covered fertiliser costs (38% ), and harvesting costs (62%). Cost for cultivation and harvesting in paddy was about 68% of production costs.
Paddy and Palm Oil Productivity.
Paddy productivity is about 5.5 tons/ha/time, then when farmer cultivates twice in a year, productivity is 11 tons/ha/year. However, farmers grow mostly one each year with productivity about 2,75 tons/ha/year. This condition caused paddy farmers had small income than oil palm farmers. Indonesian Central Bureau of Statistics data (2018) showed that productivity of dryland paddy was 5.31 tons/ha/year. This meant that paddy productivity carried out in research area is smaller than paddy productivity in Indonesia. Meanwhile, oil palm productivity on averages was 22.5 tons of fresh fruit bunches/ha/year in research area. When, It was compared to other plantations results about 24 tons/ha/year, that result was closed to 1 ton/ha/month.
Input Affecting Production and Income on Paddy
(a). Analysis Input Affecting Production on Paddy
To test Hypothesis in this research, it is used quantity model from cross-section data about 65 samples. Estimation of input affecting paddy production was
Table 1. Estimation of Paddy Production
From estimation, it found that adjusted R 2 equals of 0.8142. It had meaning that input of land acreage, input labour and input capital was to explain paddy production. Model can explain problem about 81.425 and about 18.58% was influenced other problems not included in model. F-test was 74,25. It had a meaning together (simultaneously) among land acreage, input labour, and input capital affected variation paddy production.
(b). Analysis of Input Affecting Paddy Income
Paddy income covers income earned from paddy after deducting cost incurred to get paddy. Estimation of input affecting paddy income was
Table 2. Estimation Income on Paddy
24
Blue Eyes Intelligence Engineering
& Sciences Publication
4
2
R
adj
0.8269
F-stat
91.78
It found from estimation that adjusted R 2 equal of 0.8269. It had meaning that input quantity, price, input labour and input capital was to explain paddy income. Model can explain variation paddy earnings about 82,69%. And about 17.31%, was influenced other variables not included in model. F-test was 91,78. It had a meaning together (simultaneously) among production, price, input labour and input capital affected variation paddy income.
Input Affecting Oil Palm Production and Income
(a). Analysis Input Affecting Oil Palm Production
Estimation production on oil palm used cross-section data about 65 samples. Estimation input affecting oil palm production can be seen as follows:
Table 3. Estimation Production on Oil Palm
It found that from estimation that adjusted R 2 equal 0.8293. It had meaning that land acreage, input labour and input capital was to explain oil palm production. Model can explain variation oil palm production about 82.93%. And about 17.07% was influenced not included in model. F-test was 41,94. It had a meaning together (simultaneously) among land acreage, input labour and input capital affected variation oil palm production.
(b). Estimation of Input Affecting Oil Palm Income
Income is oil palm earned from production of oil palm minus costs incurred to get production. Estimation of input affecting oil palm income can be seen as follows:
Table 4. Estimation Income of Oil Palm
Result found that adjusted R 2 was about 0.7528. It had meaning that production, price, input labour and input capital was to explain income of oil palm. Model can explain variation of oil palm about 75.28%. And, about 24.72% was influenced not included in model. F-test was 32,89. It has a meaning together (simultaneously) among production, price, input labour and input capital affected variation oil palm income.
Analysis Input Causing Paddy Converting to Oil Palm
Retrieval Number: F7408038620/2020©BEIESP
DOI:10.35940/ijrte.F7408.038620
It found that estimation of input affecting paddy converting to oil palm can be seen as follows:
Table 5. Estimation Input in Oil Palm Conversion
Result found that adjusted R 2 was about 0.8109. It had meaning education factor, social factor, income factor, money factor, land suitability, water factor was to influence land conversion of oil palm. Model can explain variation of oil palm about 81.09%. And, about 18.91% was influenced not included in model. F-test was 46.32. It has a meaning together (simultaneously) among social factor, income factor, money factor, land suitability, water factor affected converting oil palm.
Therefore, social factors (such as education, interested), economic factors (such as income, money), and land factors (such as land, water) have impact significantly in conversion paddy to oil palm. Specifically, factors caused land conversion paddy to oil palm which was economic factor and social factor.
Based on estimation, it found that water factor showed negative effect but not significant. It meant that paddy that convert to oil palm was not technical irrigation land. Result also explored that level education of farmers, paddy acreage had impact to switch to oil palm plantation as well as income factor and money factor. Good education factor caused farmers to be better knowledge in use technology or innovation and conversion to be more valuable crop.
On economic point of view, oil palm had better economic aspect than paddy which can be seen on oil palm efficiency (B/C value) better than paddy. Oil palm is a prospect crop that creates better guaranteed income than other crop i.e. paddy. Good economic value oil palm creates farmers interest to grow oil palm, rather than to paddy. Based on economic analysis, it found that it has good opportunity cost of conversion from paddy to oil palm. Expenditure cost paddy was IDR. 1,658,500, - per hectare each year and it created income of IDR. 1,667,250, - per hectare per year. Meanwhile, oil palm cost was IDR. 4,612,625, - per hectare every year and it got income IDR. 7,824,148, - per hectare per year. So, difference between cost of oil palm and paddy per hectare was IDR. 3.295,625, - and income gap was of IDR. 6.156.898, -. It had meaning that each additional cost IDR. 3.295,625, - from paddy, farmers got more income of IDR. 6.156.898, - from oil palm. Therefore, opportunity cost of land conversion paddy to palm oil was IDR. 6.156.898. This analysis showed that B/C ratio paddy was 1.02 and B/C ratio oil palm oil was 1.71.
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
340
VI. CONCLUSION
Land acreage, labour and capital affect paddy yield. In particular, variable land acreage and capital has significant effect to paddy yield, where crucial effect is capital. Income of paddy is significantly affected by variables of quantity yield, price, input labour and input capital. Purposely, income of paddy is affected by yield and price. Land acreage, input labour and capital together influence palm oil yield. Partially, all variables significantly affect oil palm yield, where crucial effect is input capital. Yield, price, input labour and capital together affect income of oil palm farmers. Partially, price and input capital have a significant effect to income of oil palm, and crucial effect is input capital. Socio-economic factors and physical factors of land affect conversion of paddy to oil palm. Partially, factors affecting extent of land switched function are educational factors, farmers' income and saving. It is that paddy fields that are more likely to be changed to oil palm plantations are dryland rather than technical irrigation. Based on farming analysis, B/C ratio of dryland paddy farming was 1.02 and B/C ratio of oil palm was 1.71. This means that the efficiency of oil palm farming is higher than efficiency of paddy farming.
REFERENCES
1. Adriani D.E., Wildayana Y., Alamsyah I., Hakim M.M. (2017): Technological innovation and business diversification: Sustainability livelihoods improvement scenario of rice farmer household in suboptimal land. Russian Journal of Agricultural and Socio-Economic Sciences, 9 pp. 77–88.
2. Alwarritzi, W. T. Nnaseki, and Y. Chomei. (2015). Analysis of the Factors Influencing the Technical among Oil Palm Smallholder Farmers in Indonesia. Procedia Environmental Science. 21 pp. 23-31
3. Amurtiya M., Lumbonyi C.A., Abdullahi A., Olaywola S.A., Yaduma Z.B., Abdullah A. (2016): Livelihood diversification and income: A case study of communities resident along the Kiri Dam, Adamaya State, Nigeria. Journal of Agribusiness and Rural Development, 4: pp. 483–492.
4. Asni, (2015). Analysis of Production, Income and Transfer of Land Function in Labuhan Batu Regency, Postgraduate Program, University of North Sumatra Medan pp. 1-67.
5. Brhanu G.A. (2018): Access to land and agricultural based livelihoods in Northwestern Ethiopia: Implications for land use. Journal of Development and Agricultural Economics, 10 pp. 292–297.
6. Daniel, M. (2012). Introduction to Agricultural Economics. Earth Literacy. Jakarta pp. 1-87.
7. Daulay, A. R. Intan E. K. P., Barus, B. and Pramudya B.N. (2016). Rice Land Conversion into Plantation Crop and Challenges on Sustainable Land Use System in the East Tanjung Jabung Regency. Procedia Social and Behavioral Sciences. 227 pp. 174-180.
8. De Vos, R.E. (2016). Multi-Functional Lands Facing Oil Palm Monocultures: A Case Study of a Land Conflict in West Kalimantan, Indonesia. Austrian Journal of South-East Asian Studies, 9(1) pp. 1132
9. Edison, (2020). The Effect of Price on Meta Profit Function Model: A Case of Western Indonesia Soybean. International Journal of Management Studies 7(1) pp. 20-25.
10. Euler M., Schwarze S., Siregar H., Qaim M. (2016): Oil palm expansion among smallholder farmers in Sumatra, Indonesia. Journal of Agricultural Economics, 67 pp. 658–676.
11. Gujarati, D. (2008). Basic Econometrics. Erlangga Press, Jakarta. Pp. 1-214.
12. Hadi, N, (2014). Replacing Rice with Oil Palm. Forestry and Estate Crops Office of Tanjung Jabung Timur Regency. Jambi. Pp. 1-83.
13. Irawan, B. (2012). Rice Land Conversion Causing Negative Impact to Food Security and Environment. Warta Penelitian dan Pengembangan Pertanian 27(6) pp. 48-57.
14. Krishna V., Eulerb M., Siregar H., Qaima M. (2016): Differential livelihood impacts of oil palm expansion in Indonesia. Agricultural Economics, 48 pp. 639–653.
Retrieval Number: F7408038620/2020©BEIESP
DOI:10.35940/ijrte.F7408.038620
341
15. Pastusiak R., Jasiniak M., Soliwoda M., Stawska J. (2017): What may determine the off-farm income? A review. Agricultural Economics – Czech, 63 pp. 380–391.
16. Saswattcha, K. Hein, L. Kroeze C. and Jawjit W. (2016). Effect of Oil Palm Expansion through Direct and Indirect Land Use Change in Tapi River Basin, Thailand. Journal of Biodiversity Science, Ecosystem Services and Management. 12(4) pp. 291-313.
17. Schwarze S., Zeller M. (2005): Income diversification of rural household in Central Sulawesi, Indonesia. Quarterly Journal of International Agriculture, 44 pp. 61–73.
18. Soekartawi. (2006). Basic Principles of Agricultural Economics, Theory and Applications. Revised Edition. Rajawali Press. Jakarta. Pp. 1-68.
19. Soekartawi, (2009). The Theory of Production Economics with the Principles of the Cobb-Douglas Function Analysis. PT Raja Grafindo Persada, First Printing. Jakarta. Pp. 1-116.
20. Sumarga, E. L. Hein. A. Hooijer and R. Vernimmem. (2016). Hydrological and Economic Effects of Oil Palm Cultivation in Indonesia Peat-lands. Ecology and Society 21(2) pp. 52-59
21. Todaro, M. P. (2008). Economic Development in the Third World. Seventh Edition. Erlangga. Jakarta. Pp. 1-109.
22. Vijay V., Pimm S.L., Jenkins C.N., Smith S.J. (2016): The impacts of oil palm on recent deforestation and biodiversity loss. PLoS ONE, 11 pp. 1-12.
23. Wildayana E., and Armanto M.E. (2018): Dynamics of land use changes and general perception of farmers on South Sumatra Wetlands. Bulgarian Journal of Agricultural Science, 24 pp. 180–188.
24. Wuepper D., Ayenew H.Y., Sauer J. (2018): Social capital, income diversification and climate change adaptation: Panel data evidence from rural Ethiopia. Journal of Agricultural Economics, 69: 23–35.
AUTHOR PROFILE
Dr. Ir. Edison, M.Sc. is associate professor from University of Jambi Indonesia. He also a former lecturer in a few private colleges for more than ten years. He also had experience for more than four years as Main Counterpart in CRC990 (Collaboration Research Centre Indonesia – Germany). Currently, he looks forward on teaching, doing research in University of Jambi. He has specializing on Agricultural Economics.
Blue Eyes Intelligence Engineering
& Sciences Publication
|
<urn:uuid:9239bde7-9778-47f7-9be0-cf80b96529f7>
|
CC-MAIN-2024-10
|
https://repository.unja.ac.id/10990/1/ARTIKEL%20IJRTE%20PATEN.pdf
|
2024-02-23T18:06:11+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-10/subset=warc/part-00007-d9675c6d-5c8d-45bb-9c98-c56e42022a4d.c000.gz.parquet
| 501,777,007
| 6,857
|
eng_Latn
|
eng_Latn
| 0.956353
|
eng_Latn
| 0.991626
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
5816,
12347,
18128,
22751,
28922
] |
FISCAL POLICY NOTE$
November 2004
Social Security, the Nation's Most Effective Safety Net Program, Keeps More than 800,000 Elderly New Yorkers out of Poverty
As the nation debates the future of Social Security, the phenomenal impact of Social Security on the economic well-being of the elderly should be at the forefront of all discussions. A new analysis of Census Bureau data measures the impact of Social Security on the elderly population in New York. Pooling the three most recent years of data from the Census Bureau's Current Population Survey, this report estimates poverty rates with and without Social Security benefits for the elderly in New York.
Without Social Security, over one million elderly New Yorkers would have incomes below the official poverty line. With Social Security benefits added to income, the number of elderly poor is reduced by 818,500 to just over 373,000. When other governmental cash programs (e.g., Supplemental Security Income, unemployment compensation, worker's compensation) are taken into account, the number of poor elderly New Yorkers falls even further to about 304,000.
New York's Elderly Poverty Rate is Cut Significantly by Social Security
Almost one half of New York's elderly population would be poor if it were not for Social Security and other government programs. When Social Security benefits are taken into consideration, New York's elderly poverty rate (for the 2001-2003 period) falls to 15.4%. When other government cash assistance programs are considered, the elderly poverty rate is reduced further to 12.6% which is the poverty rate reported in official Census Bureau publications.
While Social Security benefits are not sufficient to bring the incomes of all elderly persons above the poverty line, Social Security is still extremely important for the elderly whose incomes remain below that level. If it were not for Social Security, the poorest of the elderly would fall even further below the poverty line. In fact, Social Security makes up a very substantial proportion of the income of the low income elderly. Nationwide, Social Security constitutes 80% of the income of the elderly in both the lowest and the next lowest quintiles.
Social Security is More Important than Other
Government Programs in Reducing Elderly
Poverty in New York
Elderly Poor
Lifted Out of
Poverty by
Social Security
92%
Elderly Poor
Lifted Out of
Poverty by
Other Income
Supports
3%
Elderly Poor
Lifted Out of
Poverty by SSI
5%
Social Security is the Most Important Safety Net Program for Elderly New Yorkers
Various federal, state and local programs supplement the incomes of New York's elderly population. Although the other government programs are significant, Social Security is clearly the most important anti-poverty program for the elderly. More than 92% of the elderly lifted from poverty by government cash assistance programs in New York, are kept from poverty by Social Security benefits. SSI benefits keep another 5% of elderly New Yorkers out of poverty.
Importance for Elderly Women
The majority of elderly people lifted from poverty by Social Security are women. More than half a million elderly New York women are pulled out of poverty by Social Security benefits. The poverty rate of elderly women in New York falls from 54.5% to 17.8% when Social Security benefits are counted. Two-thirds of elderly women who otherwise would be poor — 67% — are removed from poverty by Social Security. Another 44,000 elderly women's incomes are increased above the poverty level by other government cash assistance programs, reducing the official poverty rate for elderly women in New York to 14.8%.
Elderly Poverty Rates Have Fallen While Child Poverty Rates Have Risen
The power of Social Security in lifting the elderly out of poverty is underscored by comparing the long term trends in the elderly and child poverty rates. Prior to the enactment of Social Security, poverty was widespread among the nation's elderly. Even 30 years ago, the elderly were more likely to live in poverty than the population as a whole. In 1966, 28.5% of the elderly in the United States had incomes below the poverty line, compared with 14.7% of the general population and 17.6% of children. By 2003 the national poverty rate for the elderly had fallen to 10.5% while the child poverty rate was 17.6%.
Methodological Note
For the purposes of this report, estimates of the impact of Social Security on elderly poverty were calculated for New York using U.S. Census Bureau data from the Current Population Surveys for 2002, 2003 and 2004. Three years of data were used to increase sample sizes and therefore the accuracy of the estimates.
To determine whether an individual or family is poor, that person's or family's income is compared to the official poverty line for a household of that type and size as published annually by the Census Bureau. In 2003 the official poverty line for an elderly individual was $8,825 per year while the poverty line for a two-person family with an elderly householder was $11,133. The poverty lines for elderly individuals and two-person families with elderly householders are slightly lower than the poverty lines for non-elderly individuals and two-person families with non-elderly householders.
The official poverty rates for households of different types and sizes, as determined and published by the Census Bureau, are based on a definition of income that includes all cash payments received by an individual or family, whether from earnings, government benefits, or any other source. The analysis presented in this report compares three measures of income to calculate the following three poverty measures:
* "Poverty Before Any Governmental Benefits" is estimated by comparing the official poverty thresholds to a measure of income which excludes all governmental cash benefits. This measure of income excludes income received from social security supplemental security income (SSI), unemployment insurance, worker's compensation, some types of veterans payments and cash public assistance.
* "Poverty After Social Security" is estimated by comparing the official poverty thresholds to a measure of income which adds Social Security benefits and Survivor's benefits to the measure of income which excludes governmental cash benefits.
* "Poverty After All Cash Assistance Programs" is estimated by comparing the poverty thresholds to a measure of income that includes not only Social Security but also all other government cash benefits. This is the same as the income measure used by the Census Bureau to calculate the official poverty rate.
Unlike the similar FPI report issued in 2000 (which averaged data for 1992, 1994, 1995, 1996 and 1997), this report does not take into account the value of noncash benefits (such as food stamps and housing assistance). The U.S. Census Bureau has not yet released data from the March 2004 Current Population Survey on the value of noncash benefits making it impossible to precisely replicate the earlier analysis at this time.
FISCAL POLICY INSTITUTE
www.fiscalpolicy.org
|
<urn:uuid:84cce3b1-c482-4085-a7ea-dfb5355ba335>
|
CC-MAIN-2017-13
|
http://fiscalpolicy.org/wp-content/uploads/2012/04/SocialSecurity.pdf
|
2017-03-27T10:40:11Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189471.55/warc/CC-MAIN-20170322212949-00378-ip-10-233-31-227.ec2.internal.warc.gz
| 130,517,113
| 1,459
|
eng_Latn
|
eng_Latn
| 0.996977
|
eng_Latn
| 0.99758
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1124,
3034,
4368,
7134
] |
Snap Cage MU 5C
Usage
• Transport of Steel-O-Flex, cable- and coil cable locks
• Enables transporting the lock on the seat post, on the frame and on the rack stays
• With a diameter of 19/32" - 2 11/64"
• Simple and toolless mounting
|
<urn:uuid:ccad1eaa-5dc2-4863-bbca-0fb2ae8aa8b9>
|
CC-MAIN-2019-47
|
https://mobil.abus.com/usa/abusproductsheet.pdf/4789/eng-US
|
2019-11-18T07:17:35
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2019-47/subset=warc/part-00026-47abed28-4fa2-4f4a-b4d3-db11c85b2f3a.c000.gz.parquet
| 505,974,125
| 68
|
eng_Latn
|
eng_Latn
| 0.941407
|
eng_Latn
| 0.941407
|
[
"eng_Latn"
] | false
|
docling
|
[
234
] |
MIDDLESEX MUTUAL INSURANCE CO. IS HIRING!
Multi-line Underwriter (Residential, Farm, Auto)
Do any of the following points describe you?!
* A self-motivated professional with underwriting experience?
* A team player who thrives off working with many different people?
* Are you forward thinking and enjoy 'thinking outside of the box' for solutions?
The Opportunity:
The Multiline Underwriter for Middlesex Mutual Insurance Co. reports directly to the Underwriting Manager. The incumbent will foster professional collaboration with our agents and brokers by applying their underwriting experience to our portfolio of residential, farm(agricultural) and auto business. The position ensures communication with Sales is fair and consistent while balancing the Agent/Broker needs against the company's strategic goals.
Middlesex Mutual Insurance Co. offers many benefits and perks:
* Full time permanent position
* Remote working conditions
* An established environment that values the importance of fairness, integrity, and understanding.
* An education re-payment program that supports ongoing skills development.
* A competitive pension and benefit plan.
* A Company where your efforts make a difference!
Key Duties/Responsibilities and Professional Skills:
* Assess and evaluate risks on new and existing business.
* Exercise sound judgment in risk selection.
* Apply technical knowledge and experience to underwriting, rating and documentation.
* Consistently demonstrate strong decision making and negotiation skills.
* Maintain awareness of market trends, pricing levels and legal requirements.
* Develop and maintain effective agent and broker relationships.
* Ad hoc duties as assigned by direct manager.
* Strong verbal and written communication skills
* A strong work ethic, good organizational skills and the ability to work within a team environment.
* Proficient computer skills including use of internet and willingness to learn new software program
* Substantial knowledge of insurance industry practices (e.g., underwriting practices, claims practices, etc.)
* Relate professionally and positively to all levels of Company internal and external business contacts.
Qualifications:
* 3 - 5 years of multi-line underwriting experience.
* Possess or actively working towards a CIP designation.
* Consideration will be given to candidates who have post-secondary education with specialization in insurance and experience in agribusiness, farm industry related or farm-life experience.
All employees of Middlesex Mutual Insurance Co. are responsible for:
* Abiding by all Company policies and legislative/regulatory compliance requirements as it applies to their position and the Company in general.
* Continuing to stay abreast of industry changes/upgrades and keeps their manager informed where applicable.
* Attending insurance related program(s) related meetings, seminars, etc., as required
* Understanding/supporting the company mission, vision, principles and values, provides superior customer service, and consistently promotes the corporate image.
Clients and staff are screened daily upon entry. Protective equipment is available to all customers, clients, and employees. There are regular cleaning and sanitation protocols in place, and we have adjusted workspaces to comply with social distancing guidance.
Thank you for your interest in Middlesex Mutual Insurance Co. Interested applicants, please send your resume to [email protected] Only successfully applicants will be notified.
.
Mutual Insurance Co. is an equal opportunity employer. Middlesex Mutual Insurance Co. is committed to meeting the accessibility needs of all individuals in accordance with the Accessibility for Ontarians with Disabilities Act (AODA) and the Ontario Human Rights Code (OHRC). Should you require accommodations during the recruitment and selection process, please contact Jenna Durrer at [email protected]
|
<urn:uuid:a5030453-a56c-41b5-943a-3d3677dcbb1f>
|
CC-MAIN-2021-43
|
https://www.middlesexmutual.on.ca/en/who-we-are/resources/Documents/Multiline-Underwriter-Position---Jun-2021.pdf
|
2021-10-23T20:41:55+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00145-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 1,074,828,797
| 719
|
eng_Latn
|
eng_Latn
| 0.988915
|
eng_Latn
| 0.989193
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2502,
3925
] |
The Working Woman's Shop
Consignor # __________
N. West Street
2075 Wichita, KS 67203
Phone: 316-943-3388
[email protected]
CONSIGNMENT CONTRACT
1. Items must be clean, pressed, and on hangers. We will try to inspect your items as you wait. If we are unable to inspect immediately, we will notify you if we have any unaccepted items. Any items not picked up within seven days of our notification will be donated or disposed of.
2. Consigned items will be kept on display in your name for 90 days. This period will begin when the item is initially offered for sale. We reserve the right to pull items off the floor earlier due to changing seasons, etc.
3. You will receive 40% of the actual sale price. All prices and markdowns will be determined by management.
4. Checks can usually be picked up after the 6 th of each month. Checks that haven't been picked up within 4 months of the date on the check will become void and will not be reissued. Out-oftown consignors will have their checks, less postage, mailed to them on a quarterly basis (February, May, August, and November). Let us know if you would prefer to pick up your check monthly at the shop. Checks returned to us as undeliverable will be held for 30 days only and will not be reissued.
5. You can reclaim any unsold items at the end of the consignment period. However, if you reclaim any items before the end of the consignment period, you will incur a $1 per item charge. Please call first so that we can have your items pulled and ready for you.
6. After 90 days, any unsold items become the property of the shop. They will be sold, donated, or otherwise disposed of without further responsibility to you, the consignor.
NOTICE: USED MERCHANDISE CANNOT BE INSURED. THEREFORE, IT IS UNDERSTOOD THAT The Working Woman's Shop IS NOT RESPONSIBLE FOR LOSS DUE TO FIRE, THEFT, FLOOD OR DAMAGE OF ANY KIND.
I authorize The Working Woman's Shop to sell my consigned items in accordance with this contract.
Signature _______________________________________________________ Date ____________________
Print Name _____________________________________________________________________
Address ________________________________________________________________________
City ____________________________________ State ________ Zip ___________________
E-Mail Address __________________________________________________________________
Contact number you would like us to use: ( )_________________________________
Every attempt will be made to sell consigned items at a fair and competitive price that will benefit you as a consignor and as a customer. THANK YOU FOR YOUR BUSINESS!
|
<urn:uuid:b4d4ecb4-172c-47ad-98d9-664396d13779>
|
CC-MAIN-2018-05
|
http://workingwomanshop.com/contract.pdf
|
2018-01-21T00:48:02Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889798.67/warc/CC-MAIN-20180121001412-20180121021412-00122.warc.gz
| 365,672,882
| 571
|
eng_Latn
|
eng_Latn
| 0.999348
|
eng_Latn
| 0.999348
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
2678
] |
Building Information
BURNABY PLANNING AND BUILDING DEPARTMENT
Carbon Monoxide Alarms
This brochure explains the B.C. Building Code requirements for carbon monoxide alarms in new and renovated residential buildings. It identifies the sources of carbon monoxide and provides information to homeowners and landlords who wish to install carbon monoxide alarms in existing buildings.
"This information is provided for convenience only and is not in substitution of applicable City Bylaws or Provincial or Federal Codes or laws. You must satisfy yourself that any existing or proposed construction or other works complies with such Bylaws, Codes or other laws."
Other Brochures Related to This Topic
- Smoke Alarms
- Smoke and Carbon Monoxide Alarms upgrade requirements for Single and Two Family Dwellings
B.C. Building Code requirements
Carbon monoxide is a colourless, odourless gas that is highly toxic because it interferes with the body's ability to transport oxygen through the blood to the body's cells.
Carbon monoxide poisoning is the leading cause of accidental poisoning deaths in North America. A requirement for carbon monoxide alarms in all residential buildings was required by the BC Building Code as follows:
Buildings that contain residential occupancy shall have a carbon monoxide alarm(s) installed in every bedroom or within 5 m of each bedroom door, measured along the corridor, if the suite:
Carbon Monoxide Alarms
1
Revised: 2015 January 19
- contains a fuel-burning appliance
- shares a wall/floor or ceiling with a service room that contains a fuel-burning appliance and the service room is not within the suite of residential occupancy. Carbon monoxide alarm is also required in such service room.
- shares a wall/floor/ceiling or adjacent attic or crawl space with a storage garage.
Carbon Monoxide Alarms
2
Revised: 2015 January 19
The carbon monoxide alarms shall:
- conform to CAN/CSA 6.19, Residential Carbon Monoxide Alarming Devices,
- be battery-operated or hardwired, and
- be equipped with an integral alarm conforming to CAN/CSA 6.19,
- if hardwired, must comply with CEC Rule 32-110, and
- plug-in type is not acceptable.
- be mechanically fixed at a height as per manufacturers' recommendations.
Units combing smoke and carbon monoxide alarms are acceptable.
Existing Buildings
Although carbon monoxide alarms are not required in existing buildings, they can warn you if this deadly gas leaks into your home. You need to understand how they work and what their limitations are in order to decide whether or not you need an alarm and, if you purchase an alarm, how to use it to get the best protection.
Only those detectors bearing CSA6.19 certification mark should be purchased and these must always be installed and maintained in accordance with the manufacturer's instructions.
Existing Buildings that are undergoing renovations may be required to install carbon monoxide alarms. Please refer to our brochure "Smoke and Carbon Monoxide Alarms Upgrade Requirements for Single and Two Family Dwellings".
Sources of Carbon Monoxide
Sources of carbon monoxide include: malfunctioning furnaces, exhaust vents for gas appliances or wood burning fireplaces that are not properly vented, and exhaust fumes from idling cars.
Another source of carbon monoxide can be from lit charcoal briquettes. Carbon monoxide may be produced in dangerous concentrations from even warm-to-the-touch charcoal briquettes. Never bring lit or warm to the touch charcoal indoors, whether it is in a house, garage, trailer, or tent. Heating an enclosed area with a charcoal grill can cause suffocation or death.
How Do Carbon Monoxide Alarms Work?
Carbon monoxide alarms trigger an alarm based on an accumulation of carbon monoxide over time. Carbon monoxide can harm you if you are exposed to high levels of carbon monoxide in a short period of time, or to lower levels of carbon monoxide over a long period of time. Carbon monoxide alarms require a continuous power supply, so if the power cuts off then the alarm becomes ineffective. Models are available that offer back-up battery power.
Carbon Monoxide Alarms
3
Revised: 2015 January 19
What Do I Do if the Alarm Sounds?
Don't ignore the alarm! It is intended to go off before you are experiencing symptoms. Silence the alarm, get all members of the household to fresh air, and ask whether anyone is experiencing any of the symptoms of carbon monoxide poisoning. If anyone is experiencing symptoms of carbon monoxide poisoning, call 911. If no one has symptoms, ventilate the building, identify and remedy the source of the carbon monoxide before returning inside, and have appliances or chimneys checked by a professional as soon as possible.
If you have any further questions please contact the Building Department at 604-294-7130.
Q:\Brochures-Bulletins & Zoning Information\Brochures\Current\Carbon Monoxide Alarms\Carbon Monoxide REV 2015 January 19.doc
Carbon Monoxide Alarms
4
Revised: 2015 January 19
|
<urn:uuid:773eabcd-a2fc-4fd0-9831-9ba6c9a44bf0>
|
CC-MAIN-2021-04
|
https://www.burnaby.ca/Assets/city+services/building/Brochures+$!26+Bulletins/Safety+Information/Carbon+Monoxide+Alarms.pdf
|
2021-01-28T13:06:57+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-04/subset=warc/part-00129-364a895c-5e5c-46bb-846e-75ec7de82b3b.c000.gz.parquet
| 687,894,070
| 1,058
|
eng_Latn
|
eng_Latn
| 0.995804
|
eng_Latn
| 0.996515
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1476,
1877,
4188,
5019
] |
ApiJect™ Technology Development Center
ApiJect is a U.S.-based, medical technology company using Blow-Fill-Seal (BFS) manufacturing to revolutionize how the world fills, finishes, and delivers injectable pharmaceutical drugs and sterile liquids.
ApiJect has recently completed the construction of its Technology Development Center in the greater Orlando, Florida-area. The ApiJect Center is focused on helping pharmaceutical companies prepare their drug product for high-speed, high-volume
production in a new type of scalable prefilled syringe that is made largely using the Blow-FillSeal aseptic process. The ApiJect Center directly supports the future installation of large-scale commercial manufacturing for rapid deployment of critical medications.
Expertise and Machinery
Our Experienced Industry Leaders
* In-house expertise in BFS manufacturing and device design/engineering with the ability to rapidly provide proof-of-concept and small-scale manufacturing.
* BFS experts, device engineers, computer numerical control (CNC) machinists, and scientists, each with at least 15 years of field-related experience.
Our Best-in-Class Machines and Utilities
* Machine shop with Hurco® 3-axis milling machines for prototype BFS mold design and production.
* Weiler Lab+ BFS machine for small-scale BFS evaluations (<5,000 container trials).
* Rommelag® 434 BFS machine for medium scale BFS evaluations (>5,000 container trials).
Rommelag® 434
* Full site integration of utilities for BFS manufacturing including dedicated clean steam generation, purified water systems, compressed air, chilled water supply, and cold processing capabilities.
Planned Future Expansion
The ApiJect Technology Development Center is projected to expand from its existing 16,000 square feet footprint over the next year to a 32,000 square feet freestanding facility accommodating four BFS lines, inspection, and packaging, as well as ancillary infrastructure for device prototyping and development through U.S. FDA Current Good Manufacturing Practice (cGMP) compliant commercial scale fill-finish and production. ApiJect completed this initial phase of design and construction of 16,000 square feet within 8.5 months. Architectural and engineering work for the second phase is planned for 2022, with initial construction targeted for Q3-2022.
About Blow-Fill-Seal (BFS)
BFS is an industry-recognized advanced aseptic liquid drug packaging process. In about 3-8 seconds, a rotary BFS machine forms a plastic container, fills it with a dose of the drug, and sterility seals the top. BFS is a highly efficient and scalable process, with a single larger BFS machine able to fill-finish up to 15 million doses a month.
Blowing
The polymer parison is extruded from granulated resin and positioned inside the open mold.
Filling
The mold closes and, in doing so, welds the
base. Sterile air is blown into the parison
to create the desired
The exact amount of
filling as measured by the dosing system is
fed into the container via the mandrel.
shape.
About ApiJect's Technology and Platform
ApiJect has invented a scalable and efficient drug delivery platform that enables attachable plastic components, such as a pen needle-style hub, to be attached to the top of the BFS container, turning it into a new type of single-dose prefilled syringe. The results are seen in our first potential device, the 0.5mL *. By twisting the Needle Hub onto the BFS Container and removing the cap, the healthcare worker can then inject the medicine into the patient by squeezing on the soft plastic container.
Sealing Once the mandrel is removed, the head mold comes together to form the desired closure type.
Example of ApiJect Interconnecting Component Design
BFS
Container
Additional
Components
Delivery System
(Needle Hub)
* The Prefilled ApiJect Injector has not been cleared by the FDA or other regulatory bodies.
* The Prefilled ApiJect Injector has not been cleared by the FDA or other regulatory bodies.
Demolding Opening the mold releases the container from the system and the next cycle begins.
70820_3
|
<urn:uuid:3d032a76-be3d-4cc3-81f4-45116593d194>
|
CC-MAIN-2022-21
|
https://apiject.com/wp-content/uploads/2022/05/70820_Technology_Development_Center_Data-Sheet.pdf
|
2022-05-23T02:51:38+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-21/subset=warc/part-00192-bd7ecbba-8e15-4123-ae07-d9c98ad96845.c000.gz.parquet
| 139,861,481
| 892
|
eng_Latn
|
eng_Latn
| 0.991162
|
eng_Latn
| 0.994092
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1646,
4083
] |
Central Florida Water Initiative
TOHO Water Authority 951 Martin Luther King Blvd. Kissimmee, Florida 34741
Friday, January 27, 2012 10:00 AM to 12:30 PM
Agenda:
1. Introductions
2. Previous Meeting Summary
3. Schedule
a. USGS Technology Protocol/ HAT Schedule
4. Myregion: "Creating a Regional Water Strategy for Central Florida"
5. Issues
a. Groundwater Availability Team
b. Regional Water Supply Plan for CFWI
6. Open Discussion
7. Public Comments
8. Next meeting
9. Adjourn by 12:30 PM
|
<urn:uuid:8ba23704-eaeb-428e-a2cd-6596a7c40f3d>
|
CC-MAIN-2021-25
|
https://cfwiwater.com/meetings/pdfs/2012/01-27/agenda.pdf
|
2021-06-14T05:42:44+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-25/subset=warc/part-00148-e638c5dd-3c3d-4738-8d52-dc1e9f44de3a.c000.gz.parquet
| 155,403,509
| 138
|
eng_Latn
|
eng_Latn
| 0.556076
|
eng_Latn
| 0.556076
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
493
] |
Year 6 Exploring Eastern Europe Spring 2
We are learning to:
* Use maps to locate the world's countries with a focus on Eastern Europe & South America, concentrating on their environmental regions, key physical & human characteristics, countries, & major cities.
* Use maps, atlases, globes & digital/computer mapping to locate countries & describe features.
* Understanding geographical similarities & differences through the study of human geography of a region of the United Kingdom, a region of Eastern Europe & South America.
* Vocabulary latitude, longitude, co-ordinates, physical features, human geography,
|
<urn:uuid:c41e0b21-ad36-4d1c-b974-12ac2dbd63e4>
|
CC-MAIN-2024-22
|
https://morden.merton.sch.uk/wp-content/files/title_pages/Y6/Y6%20Sp2%20Geography.pdf
|
2024-05-23T01:55:51+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-22/subset=warc/part-00194-4dd72944-e9c0-41a1-9026-dfd2d0615bf2.c000.gz.parquet
| 352,153,641
| 119
|
eng_Latn
|
eng_Latn
| 0.930616
|
eng_Latn
| 0.930616
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
616
] |
Maui mayor asks airlines for fewer tourists amid travel boom
The Hawaiian island of Maui has become so overrun with tourists in recent months that its mayor is taking the unusual step of pleading with airlines to fly in fewer people
ABC News
By AUDREY McAVOY Associated Press
July 4, 2021, 5:27 AM
* 6 min read
HONOLULU -- For nearly a year, Maui residents had their tropical oasis virtually to themselves.
Then the visitors all came flooding back.
"Over-tourism" has long been a complaint of locals on the Hawaiian island that is among the world's most popular getaways: congested roads, crowded beaches, packed restaurants.
But as the U.S. begins to emerge from the pandemic, Maui is reeling from some of the same strains seen on the mainland, like a shortage of hospitality workers. And its restaurants, still operating at limited capacity, are struggling to keep up.
Now, as cooped-up mainlanders return in droves, Maui officials are making an unusual plea to airlines: Please don't bring so many people to our island.
"We don't have the authority to say stop, but we are asking the powers to be to help us," Mayor Michael Victorino said at a recent news conference.
Hawaii has had some of the nation's most stringent coronavirus public health restrictions, and it's the only state that hasn't fully reopened, in part due to its remote location and limited hospitals. Also high on people's minds is the memory of diseases that wiped out 80% of the Native Hawaiian population in the century after Europeans arrived.
The governor doesn't plan on lifting all restrictions until 70% of the state's population is vaccinated. As of Friday, 58% were.
Yet Hawaii has become an attractive destination as other states ease rules, particularly because some overseas travel is still restricted. And Maui is a favorite spot for vacationers from the U.S. mainland, where the pace of COVID-19 vaccinations has been robust.
The Hawaii Tourism Authority said 215,148 visitors came to the island in May compared to just 1,054 during the same month last year, when tourism all but shut down amid COVID-19 fears and Hawaii's requirement that travelers quarantine upon arrival. That's not far off May 2019, when 251,665 visitors arrived.
Even more are expected over the July 4 holiday weekend, with the Maui Visitors Bureau anticipating arrivals will at least equal 2019 levels.
Restaurants, which are operating at 50% capacity, are feeling the crunch.
"We're under more pressure than we've been in pre-COVID, that's for damn sure," said Jack Starr, who manages Kimo's in Lahaina, which has a reservation wait list almost two months out.
Eateries will be allowed to start filling 75% of their seats later this week, but Starr says the employee shortage and a 6-foot (2-meter) distancing requirement for tables leave their hands tied.
"Are you kidding me?" he said. "You got to take that down to 3 feet, and we might have something going here."
At his news conference, the mayor also pointed to illegal parking along the famed Hana Highway, a two-lane country road that winds its way along Maui's lush northern coast, with the ocean on one side and breathtaking valleys and waterfalls on the other. Tourists pull over to take pictures, blocking traffic and fueling worries about what would happen if a fire truck or ambulance couldn't pass.
Maui's main airport in Kahului is also overcrowded, and its emergency services are taxed, Victorino said.
"It's the airlift that really drives all of this," he said, using an airline industry
term for transporting people and cargo. "Without airlift, people don't come."
Victorino said he has asked airlines to voluntarily limit seats to Maui, but declined to say which he spoke to. The companies are under no obligation to do as he asks, and it's unclear if any would.
Hawaiian Airlines spokesman Alex Da Silva said that as "Hawaii's hometown airline," the company is conscious of the pressure the rebound in arrivals has put on infrastructure, natural resources and communities. But he also noted visitors are the engine of the state's economic recovery.
He said Hawaiian Airlines looks forward to continuing to work with the mayor and other leaders to find solutions.
Alaska Airlines said it is operating an average of 10 daily flights to Maui from the U.S. West Coast, which is similar to summer 2019. The company said it understands residents' concerns and recently met with the mayor and councilmembers to discuss how they can "work together on responsibly rebuilding Maui's tourism industry and economy."
Not everyone thinks curbing airline travel is the answer.
Mufi Hannemann, president of the Hawaii Lodging and Tourism Association, said he worries the mayor's request sends a mixed message at a time when both the tourism industry and broader economy are clawing their way back.
"People are still unemployed. And businesses are still struggling," he said.
Hannemann instead urged cracking down on illegal vacation rentals and controlling crowds through usage fees. Oahu has done the latter, for example, by charging visitors to a popular and environmentally fragile beach called Hanauma Bay.
Maui County Councilmember Kelly King said the problem is over-tourism. She pointed out that Maui's community plan says the average daily census of travelers shouldn't exceed 33% of its 150,000 residents. But right now that number is about 42% to 45%.
She said the mayor's plea to airlines is a start, but she wants the county to enact a bill she sponsored that would impose a moratorium on new hotel construction in south and west Maui, the island's biggest tourist districts.
King argued the pandemic underscored the risks of overly relying on tourism to power the economy, noting Maui's 34% unemployment rate led the nation after travel screeched to a halt. It has since improved to 10.4% but is still far above the pre-pandemic level of 2.1%.
City Council member Yuki Lei Sugimura said residents are frustrated but appreciate travelers.
"The visitor — they are our No. 1 economic driver. They create jobs. So they're very important to us. But people are saying we want to have a balance," she said.
In the meantime, many businesses are laboring under stressful conditions, said Aman Kheiri of Lahaina's Sea House Restaurant.
"We are experiencing hostile guests, mostly tourists who are fed up with the regulations and a lack of restaurant reservations," Kheiri said. "The question is, how can we accommodate the consistently increasing numbers of tourists arriving daily?"
⸻
Associated Press journalist Mark Thiessen in Anchorage, Alaska, contributed to this report.
|
<urn:uuid:8cba2a3c-da57-484a-abc6-68d3a938b774>
|
CC-MAIN-2021-39
|
http://dhakes.com/wp-content/uploads/2021/08/20210704-Maui-mayor-asks-airlines-for-fewer-tourists-amid-travel-boom.pdf
|
2021-09-19T19:25:11+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-39/subset=warc/part-00108-f465d820-0362-4c4c-a396-c69f5fd24cc4.c000.gz.parquet
| 15,617,726
| 1,401
|
eng_Latn
|
eng_Latn
| 0.99951
|
eng_Latn
| 0.999743
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
315,
1925,
3537,
5156,
6635
] |
ROAD AMERICA – JULY 17TH TO 18TH, 2010
Road America – July 17th-18th, 2010
After getting home from Le Mans, I had two days to recover and get caught up with business before Su and I packed Humphrey and Boomer, our two canine friends, off to the kennels and caught a plane to Milwaukee. From there, we drove to our hotel in Sheboygan late on Friday night and arrived at the glorious circuit of Road America on Saturday morning, to visit with friends and take a look to see the cars entered for the "Kohler International Challenge" Can Am race.
There were no less than twenty-eight cars entered for the main race on Sunday, (see attached photos) and there were many Lola T70s and T163s (one of which, piloted by Brian Blain, won). There were also McKees and the mighty big block McLaren M8s, although a small block-engined M8 proved to be the fastest in the field, sadly retiring with two laps to go after having a wheel-to-wheel fight with the eventual winner.
Glorious weather was a feature of the meeting until Sunday afternoon when a torrential downpour stopped play for an hour until the sun dried the track. When it rains in the Midwest, it rivals Florida for the amount of water the sky can dump in the shortest possible time. The drains couldn't cope and for a while, the wind threatened to take the awnings away. One of the racers in "our group", Ed Swart and his Chevron B19, were unable to go out in the two-liter sports-racing cars race, which was a shame as we had been looking forward to seeing him run.
Site Contents © John Starkey 2010
|
<urn:uuid:81b5bce0-3130-4e71-8302-1db433e0bd73>
|
CC-MAIN-2019-22
|
https://johnstarkeycars.com/wp-content/uploads/2016/03/Road-America-July-2010_a.pdf
|
2019-05-19T10:17:18Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254751.58/warc/CC-MAIN-20190519101512-20190519123512-00232.warc.gz
| 537,268,489
| 367
|
eng_Latn
|
eng_Latn
| 0.999406
|
eng_Latn
| 0.999362
|
[
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
38,
544,
962,
1519,
1554
] |
Ratio of Health Care Providers Employed in Direct Care to Supply, by Type of Provider
Name
Ratio of Health Care Providers Employed in Direct Care to Supply, by Type of Provider
Short/Other Names
Description
Interpretation
HSP Framework Dimension
Areas of Need
Geographic Coverage
Reporting Level/Disaggregation
Indicator Results
Identifying Information
Name
Short/Other Names Indicator Description and Calculation
Description
Calculation: Description
Calculation: Geographic Assignment
Calculation: Type of Measurement
Calculation: Adjustment Applied
Calculation: Method of Adjustment
Denominator
Numerator
Activity Ratio
Ratio of health care providers employed in the profession and working in direct care divided by the number of registered health care providers, by type of provider
Measure of access to health care providers. A low or high ratio may be desirable; interpretations should be evaluated alongside other relevant data (e.g., population need, models of care, mix of health care providers).
Health System Inputs and Characteristics: Health system resources
Not applicable
All provinces/territories
National, Province/Territory, Region, Provider; may be further aggregated by age, highest level of education, setting of employment, urban/rural/remote, etc.
Web tool URL: https://www.cihi.ca/en/health-workforce
Ratio of Health Care Providers Employed in Direct Care to Supply, by Type of Provider
Activity Ratio
Ratio of health care providers employed in the profession and working in direct care divided by the number of registered health care providers, by type of provider
Calculated by dividing the number of health care providers employed in the profession and working in direct care by the total number of active registered health care providers.
Number of health care providers employed in the profession and working in direct care ÷ Total number of active registered health care providers
Unit of Analysis: Service provider
Ratio
Place of service
None
Not applicable
Description:
Inclusions:
Total number of health care providers
Active registered health care providers
Exclusions:
Inactive registrants or health care providers who did not register in a province or territory.
Additional exclusion criteria vary by type of provider.
Description:
Inclusions:
Number of health care providers employed in the profession and working in direct care
Active registered health care providers employed in the profession and working in direct care.
Additional inclusion criteria vary by type of professional.
Exclusions:
Background, Interpretation and Benchmarks
Rationale
Interpretation
HSP Framework Dimension
Targets/Benchmarks
Areas of Need
References
Availability of Data Sources and Results Data Sources
Available Data Years
Geographic Coverage
Reporting Level/Disaggregation
Result Updates
Update Frequency
Indicator Results
Updates
Quality Statement
Caveats and Limitations
Trending Issues
Comments
Health care providers not employed in the profession.
Inactive registrants or health care providers who did not register in a province or territory.
Health care providers employed in education, research and administration.
Additional exclusion criteria vary by type of provider.
Based on
World Health Organization (WHO) National Health
Measure of access to health care providers. A low or high ratio may be desirable; interpretations should be evaluated alongside other relevant data (e.g., population need, models of care, mix of health care providers).
indicator 1-05: Ratio Between Active and Workforce Accounts Registered Health Workers, by Cadre, this indicator can reveal the potential versus actual workforce providing direct care to support labour force studies.
Health System Inputs and Characteristics: Health system resources Not applicable
WHO: Ratio between active and registered health workers, by cadre World Health Organization. National Health Workforce Accounts: A . 2016. Handbook
World Health Organization. Global Strategy on Health Resources for . 2016. Health: Workforce 2030
HWDB
Type of Year:
First Available Year:
Last Available Year:
2008
2017
National, Province/Territory, Region, Provider; may be further aggregated by age, highest level of education, setting of employment, urban/rural/remote, etc.
All provinces/territories
Varies by type of provider.
Web Tool:
URL:
Health workforce data tables
Web tool URL:
https://www.cihi.ca/en/health-workforce
Not applicable
Statistics reported may differ from those reported by other organizations due to differences in data collection and reporting methodologies.
Issues of under- and/or over-coverage may vary by type of provider.
Please note that the available data years, geographic coverage, reporting level/disaggregation and update frequency vary by type of provider.
Vary by type of provider
"Available data year" can refer to (for nurses) or to data year reportin (for occupational therapists, physiotherapists and pharmacists). g year
|
<urn:uuid:b92d20a3-fbea-4a5d-a68e-534199f6c151>
|
CC-MAIN-2019-39
|
http://indicatorlibrary.cihi.ca/download/temp/pdfexport-20190921-210919-0059-4796/HSPIL-RatioofHealthCareProvidersEmployedinDirectCaretoSupply%2CbyTypeofProvider-210919-0059-4797.pdf?contentType=application/pdf
|
2019-09-21T04:59:57Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574265.76/warc/CC-MAIN-20190921043014-20190921065014-00529.warc.gz
| 92,842,288
| 973
|
eng_Latn
|
eng_Latn
| 0.932629
|
eng_Latn
| 0.935197
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2583,
5033
] |
OBJECT RECOGNITION IN SUPPORT OF SOF OPERATIONS
by
William L. Clark
June 2021
Thesis Advisor: Alex Bordetsky
Co-Advisor: Steven J. Mullins
Second Reader: Douglas A. Borer
Approved for public release. Distribution is unlimited.
THIS PAGE INTENTIONALLY LEFT BLANK
Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503.
| 1. AGENCY USE ONLY (Leave blank) | 2. REPORT DATE | 3. REPORT TYPE AND DATES COVERED |
|----------------------------------|----------------|----------------------------------|
| | June 2021 | Master’s thesis |
| 4. TITLE AND SUBTITLE | 5. FUNDING NUMBERS |
|---------------------------------|--------------------|
| OBJECT RECOGNITION IN SUPPORT OF SOF OPERATIONS | |
| 6. AUTHOR(S) | 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) |
|--------------|---------------------------------------------------|
| William L. Clark | Naval Postgraduate School |
| | Monterey, CA 93943-5000 |
| 8. PERFORMING ORGANIZATION REPORT NUMBER |
|-----------------------------------------|
| |
| 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) |
|----------------------------------------------------------|
| SOCOM S&T, MacDill Air Force Base, Florida 33621; Office of Naval Research, Arlington, VA 22217 |
| 10. SPONSORING / MONITORING AGENCY REPORT NUMBER |
|-------------------------------------------------|
| |
| 11. SUPPLEMENTARY NOTES | 12a. DISTRIBUTION / AVAILABILITY STATEMENT |
|-------------------------|-------------------------------------------|
| The views expressed in this thesis are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government. | Approved for public release. Distribution is unlimited. |
| 12b. DISTRIBUTION CODE |
|------------------------|
| A |
| 13. ABSTRACT (maximum 200 words) |
|----------------------------------|
| Current and future operational environments will increasingly require Special Operation Forces (SOF) to be more self-sufficient while operating in contested and politically sensitive regions where situational awareness can be degraded. This project continues Semi-Autonomous Threat Learning Alert System (SATLAS) efforts to integrate artificial intelligence-enabled small unmanned aerial systems into SOF teams to increase situational awareness and survivability. Specifically, we focus on directing prototype development and evaluating the ability of object recognition software to detect and categorize trained entities including weapons, personnel, and vehicles. Collaborating with commercial industries, we conduct simulation and field experiments to measure the ability of the Surveillance, Persistent Observation and Targeting Recognition (SPOTR) object recognition software to meet the technical requirements of the SATLAS project and operational requirements of SOF teams. We evaluate SPOTR based on accuracy, number of entities detected, and range of detection and recommend methods to improve its performance and meet our determined operational requirements. We advance the SATLAS project and set conditions for subsequent student teams to continue these efforts. |
| 14. SUBJECT TERMS |
|-------------------|
| SATLAS, machine learning, artificial intelligence, drone |
| 15. NUMBER OF PAGES |
|---------------------|
| 101 |
| 16. PRICE CODE |
|----------------|
| UU |
| 17. SECURITY CLASSIFICATION OF REPORT |
|---------------------------------------|
| Unclassified |
| 18. SECURITY CLASSIFICATION OF THIS PAGE |
|------------------------------------------|
| Unclassified |
| 19. SECURITY CLASSIFICATION OF ABSTRACT |
|-----------------------------------------|
| Unclassified |
| 20. LIMITATION OF ABSTRACT |
|-----------------------------|
| UU |
THIS PAGE INTENTIONALLY LEFT BLANK
OBJECT RECOGNITION IN SUPPORT OF SOF OPERATIONS
William L. Clark
Major, United States Army
BA, North Carolina State University, 2009
Submitted in partial fulfillment of the requirements for the degree of
MASTER OF SCIENCE IN DEFENSE ANALYSIS (ASTRONAUTICS)
from the
NAVAL POSTGRADUATE SCHOOL
June 2021
Approved by: Alex Bordetsky
Advisor
Steven J. Mullins
Co-Advisor
Douglas A. Borer
Second Reader
Douglas A. Borer
Chair, Department of Defense Analysis
THIS PAGE INTENTIONALLY LEFT BLANK
Current and future operational environments will increasingly require Special Operation Forces (SOF) to be more self-sufficient while operating in contested and politically sensitive regions where situational awareness can be degraded. This project continues Semi-Autonomous Threat Learning Alert System (SATLAS) efforts to integrate artificial intelligence-enabled small unmanned aerial systems into SOF teams to increase situational awareness and survivability. Specifically, we focus on directing prototype development and evaluating the ability of object recognition software to detect and categorize trained entities including weapons, personnel, and vehicles. Collaborating with commercial industries, we conduct simulation and field experiments to measure the ability of the Surveillance, Persistent Observation and Targeting Recognition (SPOTR) object recognition software to meet the technical requirements of the SATLAS project and operational requirements of SOF teams. We evaluate SPOTR based on accuracy, number of entities detected, and range of detection and recommend methods to improve its performance and meet our determined operational requirements. We advance the SATLAS project and set conditions for subsequent student teams to continue these efforts.
THIS PAGE INTENTIONALLY LEFT BLANK
# TABLE OF CONTENTS
I. INTRODUCTION ...........................................................................................................1
A. BACKGROUND ....................................................................................................2
B. RESEARCH OBJECTIVE .....................................................................................4
C. SCOPE AND LIMITATIONS ...............................................................................4
D. ORGANIZATION OF THESIS .............................................................................5
II. LITERATURE REVIEW ...............................................................................................7
A. VIGNETTE – THE WARFIGHTER ISR SHORTFALL ........................................7
B. THE FUTURE STRATEGIC ENVIRONMENT ..................................................9
C. EMERGING TECHNOLOGY ..............................................................................11
1. sUAS ..................................................................................................................12
2. Object Recognition ............................................................................................15
D. PRIOR WORK .......................................................................................................17
1. Deep Learning and sUAS Object Recognition .............................................17
2. SQUAD X Experiments ....................................................................................18
3. Object Recognition and Super-Resolution ..................................................20
4. AI Robots and Increased Combat Effectiveness .........................................21
III. EXPERIMENT DESIGN ............................................................................................23
A. EXPERIMENT DESIGN METHODOLOGY .......................................................24
1. Down Select Considerations ..........................................................................25
2. Design Variables ..............................................................................................29
3. Functional Constraints ...................................................................................31
4. Criterion Variables ..........................................................................................32
5. Relationship Between Variables ....................................................................36
B. EXPERIMENT PHASES .......................................................................................36
1. Phase 0 – Simulation Software Validation ..................................................37
2. Phase I – SPOTR Software Familiarization ................................................41
3. Phase II – Discovery Experiments: Simulation ...........................................45
4. Phase III – Discovery Experiments: Field ....................................................51
IV. ANALYSIS AND IMPLICATIONS ............................................................................59
A. ANALYSIS BY PHASE .......................................................................................59
1. Phase 0 .............................................................................................................59
2. Phase I .............................................................................................................61
3. Phase II .............................................................................................................64
4. Phase III ............................................................................................................67
B. OPERATIONAL IMPLICATIONS ................................................................. 71
1. Accuracy and Recall ........................................................................... 72
2. Quantity ............................................................................................. 72
3. Slant Range ....................................................................................... 74
V. CONCLUSION ......................................................................................... 75
A. SUMMARY ............................................................................................ 75
1. Technical Implications ....................................................................... 76
2. Operational Implications ................................................................... 76
3. Integration Process ........................................................................... 77
B. LIMITATIONS ....................................................................................... 77
C. FUTURE WORK ..................................................................................... 78
LIST OF REFERENCES ............................................................................... 79
INITIAL DISTRIBUTION LIST .................................................................. 83
| Figure | Description | Page |
|--------|-----------------------------------------------------------------------------|------|
| 1 | Precision-Recall Curve | 17 |
| 2 | Correlation of Forces Calculator Results of AI-Enabled Platoons | 22 |
| 3 | Experiment Design Campaign Plan | 24 |
| 4 | SPOTR Classification Process | 26 |
| 5 | Nibbler sUAS | 28 |
| 6 | Aerial View of Simulated Environment | 38 |
| 7 | ArduCopter sUAS Used in Simulated Environment | 38 |
| 8 | April 23 Demonstration Footage | 39 |
| 9 | Slant-Range Distance | 41 |
| 10 | SPOTR Simulation View | 43 |
| 11 | SPOTR Performance (Phase 1) | 45 |
| 12 | Phase II: Hardware-in-the-Loop Setup | 46 |
| 13 | Simulated Environment Zones Used during Phase II Testing | 47 |
| 14 | Phase II Test of Zone 7 | 48 |
| 15 | SPOTR Performance for Phase II: Zone 7 | 50 |
| 16 | SPOTR Performance for Phase II: Zone 1 | 50 |
| 17 | Phase III: Live Testing Setup | 51 |
| 18 | Phase III Testing Zones | 52 |
| 19 | SPOTR Performance for Phase III: Zone 1 | 55 |
| 20 | SPOTR Performance for Phase III: Zone 2 | 56 |
| 21 | SPOTR Performance for Phase III: Zone 3 | 56 |
| 22 | SPOTR Detection Range: Narrow-Camera | 71 |
THIS PAGE INTENTIONALLY LEFT BLANK
| Table | Description | Page |
|-------|-----------------------------------------------------------------------------|------|
| 1 | RPUAS Capability Requirements | 14 |
| 2 | Design, Functional, and Criterion Variables | 25 |
| 3 | SATLAS and RPUAS Requirements | 33 |
| 4 | Accuracy Requirements and Accuracy Performance: Phase I* | 61 |
| 5 | Quantity of Entities Detected: Phase I | 63 |
| 6 | Accuracy Requirements and Accuracy Performance: Phase II* | 65 |
| 7 | Quantity of Entities Detected: Phase II | 66 |
| 8 | Accuracy Requirements and Accuracy Performance: Phase III* | 68 |
THIS PAGE INTENTIONALLY LEFT BLANK
| Acronym | Description |
|---------|-------------|
| AGL | Above Ground Level |
| AI | Artificial Intelligence |
| ARSOF | Army Special Operations Forces |
| ATAK | Android Tactical Assault Kit |
| COTS | Commercial Off the Shelf |
| DARPA | Defense Advanced Research Projects Agency |
| DCLT | Detect, Categorize, Localize, and Track |
| DL | Deep Learning |
| DNN | Deep Neural Network |
| DOD | Department of Defense |
| FMV | Full Motion Video |
| HEO | Hyper Enabled Operator |
| H-GCS | Handheld Ground Control Station |
| ISIS | Islamic State of Iraq and Syria |
| ISR | Intelligence, Surveillance, Reconnaissance |
| MDO | Multi-Domain Operations |
| ML | Machine Learning |
| PC | Probability of Categorization |
| PD | Probability of Detection |
| PSI | Parameter Space Investigation |
| RPUAS | Rucksack Portable Unmanned Aerial System |
| SATLAS | Semi-Autonomous Threat Learning Alert System |
| SFOD-A | Special Forces Operational Detachment - Alpha |
| SOCOM | Special Operations Command |
| SOF | Special Operations Forces |
| SPOTR | Surveillance, Persistent Observation and Targeting Recognition |
| SUAS | Small Unmanned Aerial System |
| UAS | Unmanned Aerial System |
| VTOL | Vertical Take Off and Landing |
| YOLO | You Only Look Once |
THIS PAGE INTENTIONALLY LEFT BLANK
ACKNOWLEDGMENTS
This project would not have been possible without the support of several individuals and organizations. First and foremost, I would like to thank my wife, Laura, for supporting me through this journey. You are the bedrock of our family and your flexibility and sacrifice are the only reasons this project was completed.
I would also like to thank Steve Mullins. Your advice, perspective, and willingness to sacrifice so many of your red pens are truly responsible for this project. Thank you for giving shape to this project. You are an incredible asset to the SATLAS team and the Naval Postgraduate School.
Additionally, I would like to thank Joe Kehoe and Ha Duong at AeroVironment for providing the technical knowledge and experiment support necessary to move this project in the right direction. Without your help, I might still be looking for experiment ideas.
Finally, I would like to thank the Office of Naval Research and the U.S. Special Operation’s Command Science and Technology Directorate for funding the research and prototype development in our quest to try and save lives.
THIS PAGE INTENTIONALLY LEFT BLANK
I. INTRODUCTION
The demand for U.S. forces, specifically Special Operations Forces (SOF), to address asymmetric and non-state actors is expected to increase over the next decades. Multidomain operations (MDO) anticipates that SOF will be required to conduct expeditionary operations independent of responsive support systems and in increasingly complex environments where adversaries and terrain can threaten operational security and restrict freedom of maneuver. The 2018 *National Defense Strategy* (NDS) and the Army’s MDO doctrine project that SOF will need to operate in contested environments where all types of support will be more difficult compared to Iraq and Afghanistan,\(^1\) where the U.S. has enjoyed air supremacy, mobility, and technically superior equipment. Army Special Operations doctrine clearly defines the necessity of “operations requiring unique modes of employment, tactical techniques, equipment, and training often conducted in hostile, denied, or politically sensitive environments…and characterized by a high degree of risk.”\(^2\)
In such conditions, SOF teams will need to be more self-sufficient in all aspects of their extended operations from intelligence to fires to logistics. The strategic environment highlighted in the *National Defense Strategy* warns that it may be infeasible to operate large unmanned aerial systems (UAS) to support small units in the presence of peer or near peer adversaries in politically sensitive or deep areas.\(^3\) In that context, large, expensive, and theater-level UAS cannot be relied upon to provide dedicated intelligence, surveillance, and reconnaissance (ISR), which will be essential when operating in these
---
\(^1\) Department of the Army, *The U.S. Army in Multi-Domain Operations 2028*, U.S. Army TRADOC Pamphlet 525-3-1 (Washington, DC: Department of the Army, 2018), 17–21, December 6, 2018, https://api.army.mil/e2/c/downloads/2021/02/26/b45372c1/20181206-tp525-3-1-the-us-army-in-mdo-2028-final.pdf
\(^2\) Department of the Army, *Army Special Operations*, ADP 3–05 (Washington, DC: Department of the Army, 2019), ix, https://armypubs.army.mil/epubs/DR_pubs/DR_a/pdf/web/ARN18909_ADP%203-05%20C1%20FINAL%20WEB(2).pdf
\(^3\) Department of Defense, *Summary of the 2018 National Defense Strategy of the United States of America*. (Washington, DC: Department of Defense 2018. National Defense Strategy), 2–3, Department of Defense, 2018. https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf
environments. There is an urgent need for real-time, organic ISR capability at the team level.\(^4\)
Nonetheless, many SOF units continue to be equipped with small unmanned aerial systems (sUAS) such as the RQ-11 Raven, that possess outdated technological capabilities, require a dedicated operator and a large, fixed position from which to operate. Those systems are already inadequate, but no replacement sUAS with state-of-the-art capabilities has been fielded. We propose that advanced sUAS platforms could enhance situational awareness and survivability at the small unit level. Fortunately, military and corporate research continue to make significant advances in developing drone technology and machine learning (ML) algorithms for the Department of Defense (DOD) that promise to simultaneously enhance the autonomy of small units and reduce the operator’s cognitive load.
The warfighter gap that we address in this research is the lack of a sUAS platform that meets the emerging needs at the SOF team level. Many current efforts to enhance UAS with Artificial Intelligence (AI)/ML are focusing on large theater level assets, such as the MQ-9 Reaper.\(^5\) We opine that this prioritization, intentional or not, incurs unnecessary risk by not also adequately focusing on adopting some of the abundant, affordable, and man-packable commercial-off-the-shelf (COTS) sUAS to meet small unit requirements.
A. **BACKGROUND**
The first phase of the Semi-Autonomous Threat Learning Alert System (SATLAS) project was undertaken by Midgett et. al. from June 2019 to December 2020 and explored this concept through quantitative analysis and by identifying key capability requirements.\(^6\)
---
\(^4\) Department of the Army, *Army Futures Command Concept for Special Operations* 2028, Army Futures Command Pamphlet 71-20-4; (Washington, DC: Department of the Army, 2020), 18, https://api.army.mil/e2/c/e/downloads/2021/01/05/bdd61c44/20200918-afc-pam-71-20-4-afc-concept-for-special-operations-2028-final.pdf
\(^5\) David Hambling, “U.S. To Equip MQ-9 Reaper Drones with Artificial Intelligence,” *Forbes*, (December 2020), https://www.forbes.com/sites/davidhambling/2020/12/11/new-project-will-give-us-mq-9-reaper-drones-artificial-intelligence/?sh=37723b3e7a8e.
\(^6\) Midgett et. al., “Semiautonomous Threat Learning Alert System,” (master’s thesis, Naval Postgraduate School, 2020), 46–52, December 2020.
They acquired sponsor funding from the Office of Naval Research and SOCOM’s Science and Technology department and conducted market research to ascertain the current state of development of COTS and government sUAS and relevant software. Then they identified four priority capability requirements critical to improving situational awareness and decision-making for SOF teams: 1) a versatile, man-packable sUAS platform whose manufacturer would permit the team to integrate selected software functions, 2) AI-enabled object detection capable of on-the-edge processing, 3) autonomous tasking capability, and 4) a common ground control user interface.
They observed that the Defense Innovation Unit’s “Blue sUAS” program is working to introduce a man-packable sUAS platform program of record; however, fielding had yet to begin.\(^7\) The Defense Advanced Research Projects Agency has tested the use of object detection software in sUAS and in robots at the squad level and found that it can significantly increase survivability and decision-making, but no efforts towards implementation have been made.\(^8\) Autonomous tasking remains in its early stages of development within the commercial sector\(^9\); finally, the Android Tactical Assault Kit (ATAK) has proven capable of meeting the user interface demands of SOF.\(^10\) The objective of the ongoing SATLAS research project is to integrate these four pillars into a versatile ISR prototype for SOF teams.
The purpose of this thesis is to continue a longitudinal research project that seeks to design and develop a prototype deep learning (DL) enabled, semi-autonomous sUAS, and to evaluate its feasibility to support small units. It continues advancement towards a proof of concept that integrates hardware and software solutions to enhance SOF team’s
---
\(^7\) Department of Defense, *Defense Innovation Unit Announces sUAS Product Availability to Provide Secure, Capable Small Unmanned Aerial Systems for Critical Uses Across the Government*, Washington, DC: Department of Defense, 2020, https://www.defense.gov/Newsroom/Releases/Release/Article/2318799/defense-innovation-unit-announces-suas-product-availability-to-provide-secure-c/
\(^8\) Defense Advanced Research Projects Agency, *With Squad X, Dismounted Units Partner with AI to Dominate Battlespace*, (Washington, DC: Defense Advanced Research Projects Agency, 2019), https://www.darpa.mil/news-events/2019-07-12
\(^9\) Department of Defense, *Eyes of the Army: U.S. Army Roadmap for UAS 2010–2035*, (Washington, DC: Department of Defense, 2010), 7–9, https://fas.org/irp/program/collect/uas-army.pdf
\(^10\) George Seffers, “Army Tactical Assault Kit Always Adapting for New Era,” SIGNAL Magazine, October 28, 2020, https://www.afcea.org/content/army-tactical-assault-kit-always-adapting-new-era.
combat effectiveness and survivability by providing an organic ISR platform to support situational awareness.
The specific focus of this thesis is on the second pillar; the addition of an object recognition capability into a sUAS. Our principal task is to manage its integration onto a surrogate platform, and eventually onto the prototype. Working collaboratively with a private firm and DOD affiliates, we direct and monitor the integration and conduct interim performance evaluations of AeroVironment’s Surveillance, Persistent Observation and Targeting Recognition (SPOTR) suite in a virtual environment and on a Nibbler sUAS. The Nibbler serves as the surrogate experimental sUAS based on its platform characteristics, its availability, its compatibility with ATAK, and the willingness of the manufacturer to allow us to access its open architecture.
B. RESEARCH OBJECTIVE
In this study we incorporate emerging object recognition software on to a sUAS to enhance the situational awareness of SOF teams. We direct the integration process and conduct simulation experiments to measure the performance of the SPOTR software to detect and categorize entities.
The primary research question is:
Can the integration of SPOTR object recognition into a sUAS achieve the technical parameters to meet SOF team operational requirements?
We evaluate the technical performance of the SPOTR software on a Nibbler sUAS for its potential operational impact. By managing this integration process, we advance the project toward a prototype that meets our specific performance requirements. We also establish a baseline for future student researchers to continue to develop this and the remaining pillars of the prototype with the integration of autonomous features and a common user interface.
C. SCOPE AND LIMITATIONS
We focus on Pillar 2, integrating object recognition capability into the sUAS with emphasis on its technical performance. Future work will address the subsequent pillars of
autonomous capabilities and a common user interface. This research remains unclassified to aid following SATLAS project teams.
Software development cycles, the COVID 19 pandemic, and sUAS platform acquisition time constraints limit our ability to conduct tests in realistic operational scenarios. While the technical and operational requirements will vary across the various operating environments in which SOF may operate, we test only in the context of a temperate zone. In our field testing, we use the Nibbler. Our findings may not be applicable to other sUAS platforms and will need to be evaluated separately, depending upon which platform is selected as the prototype. We conduct our simulation experiments in collaboration with the commercial software developer.
D. ORGANIZATION OF THESIS
Chapter II provides a review of prior research, emerging operational doctrine and threat assessments, and the current state of sUAS and object recognition technology. Chapter III explains our research method, beginning with the background for the test criteria. It then describes our research design, tests, and results. Chapter IV presents the analysis of the results. Chapter V summarizes the significant findings and proposes the way ahead.
THIS PAGE INTENTIONALLY LEFT BLANK
II. LITERATURE REVIEW
This chapter is divided into four sections. The first section sets the tactical context with a factual vignette that illustrates the urgent need for a dedicated, highly capable sUAS for SOF teams. The second section explores what the United States has defined as the future operational environment and the evolving demand for technological solutions to better enable SOF teams. The third section examines military applications for sUAS and AI and the final section reviews prior work on this topic.
A. VIGNETTE – THE WARFIGHTER ISR SHORTFALL
In 2018, Special Forces Operational Detachment Alpha (SFOD-A) 0221 was deployed to a remote region in the Middle East and tasked to secure an area approximately 50 square kilometers that was controlled by Islamic State of Iraq and Syria (ISIS) militants. It was given continuous access to theater-level ISR and supporting fires. As the SFOD-A advanced deep into enemy territory over the course of 5 weeks, the distance between their forward outpost and the forward line of troops grew. To maintain offensive pressure, they employed multiple 3-man observation and surveillance teams to detect enemy positions and call for indirect and aerial delivered munitions on targets. These teams were generally more than 10 kilometers from any friendly position.
One day, during early morning hours, the theater-level ISR asset that had been providing surveillance for one of the observation teams was re-tasked to support a different SFOD-A. Without warning, that team was left without any external overhead surveillance support. The SFOD-A’s only organic sUAS, a RQ-11 Raven, was inoperable due to broken parts and was also too large to be man-packable. As the 3-man surveillance team increased its security posture to compensate for the loss of the ISR asset, a squad of ISIS militants quietly approached them. The militants were not detected until they were within 75 meters of the team, well within firing distance. The ISIS squad immediately engaged the 3-man team with automatic weapons and hand grenades. As the surveillance team fought back, the SFOD-A launched a quick reaction force to assist, and the combined elements eventually eliminated the militants. During the firefight one soldier on the surveillance
team was killed in action and the others were wounded, virtually eliminating the SFOD-A’s combat effectiveness.
After consolidating and reorganizing, the team resumed combat operations several days later. To adjust for the increasing distance between the outpost position and the forward line of troops, the SFOD-A emplaced check points along the route between the two positions. Host Nation forces were unavailable or unwilling to operate the check points, so local militia forces volunteered their services. After some vetting, four militia check points were positioned along the route to provide security. The militia forces came armed with their own weapons and wore modest uniforms, and required a significant amount of support from the SFOD-A. This support required the U.S. forces to interact with militia members on a regular basis through a series of key leader engagements. The frequent leader engagements were assessed to be at low risk despite taking place in one of the most violent areas within the region. Therefore, the SFOD-A was assigned a low priority for support from the limited theater-level ISR assets.
It was not long before the SFOD-A again suffered the consequences of that prioritization. Upon departing a check point after one leader engagement, a 5-man team from the SFOD-A was ambushed by ISIS militants with a long burst of automatic machine gun fire from 50 meters away. Immediately, over half of the team was wounded or killed. They returned fire, began rudimentary triage, and engaged in a firefight as they desperately withdrew to a secure position. The team eventually received close air support and destroyed the enemy position. This author, the Detachment Commander of the SFOD-A, strongly contends that had the team been equipped with an organic sUAS, they would have detected the assaulting squad and prevented or effectively responded to the ambushes.
In an earlier example, an SFOD-A on a mission in Niger in 2017 was not supported by any ISR assets and in that incident four service members were killed in action.\(^{11}\) The SFOD-A was engaged in a remote region in Africa with nominal external ISR support and was unaware that a large group of ISIS militants were quickly approaching their position.
\(^{11}\)Alice Friend, *DOD’s Report on the Investigation into the 2017 Ambush in Niger*, (Washington, DC: Center for Strategic and International Studies, 2018), 2–6, https://www.csis.org/analysis/dods-report-investigation-2017-ambush-niger.
The absence of surveillance support significantly limited their situational awareness and the SFOD-A was rapidly overwhelmed, became separated in the confusion, and suffered the loss of four Soldiers’ lives.
It is the assessment of the SATLAS project team that as SOF are increasingly tasked to combat asymmetric threats in remote and contested regions where they cannot depend upon external support, they will require a reliable, versatile organic ISR asset. We further propose that this warfighter shortfall is urgent and brings unacceptable risk to SOF teams, yet a solution should be rapidly and inexpensively achievable.
B. THE FUTURE STRATEGIC ENVIRONMENT
In 2014, Kremlin forces wearing green uniforms absent any rank or insignia encircled government buildings, secured key sites, and successfully annexed Crimea from Ukraine.\(^{12}\) Months of Russian-backed protests, propaganda campaigns, and economic pressure had set conditions that allowed Russia to seize the region with limited response from Ukraine or the West.\(^{13}\) Russia’s acts of irregular or hybrid warfare and China’s whole-of-government approach to spread influence and expand its footprint to undercut the United States,\(^{14}\) caused the United States to reevaluate its capability to deter or respond to near-peer adversaries.
The 2018 *National Defense Strategy* shifted to prioritize Great Power Competition while remaining committed to the defeat of violent extremist organizations.\(^{15}\) The evolving doctrine of Multi-Domain Operations (MDO) is the U.S. Army’s response to this reprioritization as it attempts to grasp a future operational environment that includes the use
\(^{12}\) Michael Kofman et al., *Lessons from Russia’s Operations in Crimea and Eastern Ukraine*, RR 1498 (Santa Monica, CA: RAND, 2017), 5–16, https://www.rand.org/pubs/research_reports/RR1498.html.
\(^{13}\) Heather A Conley et al., *The Kremlin Playbook: Understanding Russian Influence in Central and Eastern Europe*, (Washington, DC: Center for Strategic and International Studies, 2016), 1–5, https://www.csis.org/analysis/kremlin-playbook.
\(^{14}\) Office of the Director of National Intelligence, *Annual Threat Assessment of the U.S. Intelligence Community*, (Washington, DC: Office of the Director of National Intelligence, 2021), 4–11, https://www.dni.gov/files/ODNI/documents/assessments/ATA-2021-Unclassified-Report.pdf
\(^{15}\) Department of Defense, *National Defense Strategy*, 1–3.
of military and non-military means by near-peer and asymmetric adversaries to degrade U.S. influence and deny access.\textsuperscript{16} MDO highlights four key trends to expect in the future operating environment; 1) adversaries will contest U.S. presence in all domains, 2) smaller armies will fight on larger and more lethal battlefields, 3) nation-states will be less able to impose their will, and 4) near-peer competition will take place below the level of armed conflict. The MDO also introduces three tenets to adapt the American way of war: a calibrated force posture, multi-domain operations, and convergence.\textsuperscript{17} Guided by these tenets, ARSOF leadership has assessed the unique capability that its SFOD-A teams will need to provide within this operational concept. They must be regionally aligned, able to employ clandestine infiltration techniques, and operate by, with, and through partner or surrogate forces to reduce large U.S. footprints in sensitive areas.\textsuperscript{18}
In addition to the changing threats, the Chief of Staff of the U.S. Army acknowledged the revolutionary impact that emerging technologies, such as artificial intelligence, nanotechnology, machine learning, and robotics, will have on the fundamental nature of war.\textsuperscript{19} To prepare SOF teams for the future MDO environment, U.S. Special Operations Command (SOCOM) recently prioritized technological solutions to increase situational awareness and improve decision-making for small teams. The FY 2021 U.S. SOCOM Acquisition, Technology, and Logistics Directorate of Science and Technology announcement emphasizes efforts to hyper-enable SOF teams, recognizing that the future operating environment will require SOF to operate in “satellite denied/disrupted environments, under threat of targeting by high-end military capabilities….and where increased scrutiny is routine.”\textsuperscript{20}
\textsuperscript{16}Department of the Army, \textit{The U.S. Army in Multi-Domain Operations 2028}, 15–20.
\textsuperscript{17} Department of the Army, \textit{The U.S. Army in Multi-Domain Operations 2028}, 15–20.
\textsuperscript{18} Department of the Army, \textit{Army Futures Command Concept for Special Operations 2028}, 9–11.
\textsuperscript{19} Jim Garamone, “Milley Makes Case for U.S. Military Keeping Up With Global, Technology Changes,” U.S. Department of Defense, (December 2, 2020): https://www.defense.gov/Explore/News/Article/Article/2432855/milley-makes-case-for-us-military-keeping-up-with-global-technology-changes/.
\textsuperscript{20} Department of Defense, \textit{Broad Agency Announcement For Technology Development and Advanced Technology Development} (Washington, DC: Department of Defense, 2020).
U.S. SOCOM defines the Hyper Enabled Operator (HEO) as a Special Operations professional equipped with technology that enables more timely and accurate decision-making while increasing situational awareness and minimizing cognitive overload.\textsuperscript{21} To achieve an HEO, U.S. SOCOM has designated several focus areas for future research. Among these are autonomy-enabled ISR/battlefield situational awareness; group 1 sUAS payloads; edge computing to support localized SOF teams; and sensor algorithms to locate, classify, characterize, and identify items of interest.\textsuperscript{22} These particular focus areas greatly informed the original conceptualization of the SATLAS project.
While still in the early stages of development, there is significant potential within these areas to create HEOs capable of defeating asymmetric and near-peer adversaries. Unfortunately, the Army appears to remain locked in a culture that prioritizes large, costly, and expensive platforms despite acknowledging a future operational environment in which smaller, less expensive, unmanned UAS will be most beneficial.\textsuperscript{23} Additionally, the Army’s byzantine acquisition system is overly complex and unable to field technologies in any reasonable time.\textsuperscript{24} These disconnects and the proliferation of COTS technologies capable of meeting the demands of SOF teams have motivated bottom-up approaches from the field to solve this critical shortfall.
C. EMERGING TECHNOLOGY
While no single technology will help to create HEOs, there are technologies whose integration could hyper enable operators through the real-time collection of data, distilling the data down into mission relevant information, disseminating the data to personnel able
\textsuperscript{21} Department of Defense, \textit{Broad Agency Announcement For Technology Development and Advanced Technology Development}.
\textsuperscript{22} Department of Defense, \textit{Broad Agency Announcement For Technology Development and Advanced Technology Development}.
\textsuperscript{23} Liam Collins and Harrison Morgan, “Affordable, Abundant, and Autonomous: The Future of Ground Warfare,” \textit{War on the Rocks} (April 21, 2020): https://warontherocks.com/2020/04/affordable-abundant-and-autonomous-the-future-of-ground-warfare/.
\textsuperscript{24} Jennifer McArdle, “Simulating War: Three Enduring Lessons from the Louisiana Maneuvers,” \textit{War on the Rocks} (March 2021), https://warontherocks.com/2021/03/simulating-war-three-enduring-lessons-from-the-louisiana-maneuvers/.
to use it, and, ultimately, strengthening our capability to compete in a MDO environment.\textsuperscript{25} While the vision of the SATLAS project team is to integrate four of these technologies, including a sUAS platform, AI-enabled object recognition, autonomy, and a common user interface, this thesis focuses on developing Pillar 2.
1. **sUAS**
Militaries have experimented with UAS since the 19\textsuperscript{th} century to increase situational awareness and reduce what Carl Von Clausewitz described as “friction”.\textsuperscript{26} While the explosion in the use of drones may appear to be a recent phenomenon, the first use military use of a drone actually occurred in 1849, when Austria used a hot air balloon to bomb Venice during the First Italian War of Independence.\textsuperscript{27} Though the earlier applications of UAS platforms were nearly indistinguishable from missiles, the experimental use of drones continued through nearly all major conflicts.\textsuperscript{28} Significant technological advancements in the late 20\textsuperscript{th} and early 21\textsuperscript{st} centuries have led to the use of drones by the United States in both lethal and nonlethal applications to address the asymmetric threats that have risen in the post-9/11 era.\textsuperscript{29} The capability of UAS platforms to provide near real time intelligence to military commanders and civilian senior leaders has led these systems to become associated with the American style of war.\textsuperscript{30}
Many U.S. SOF teams are still equipped with the RA-11B Raven as their organic UAS; however, advances in the civilian market have enabled research into smaller, more capable systems. The Raven has been fielded in its current form since 2006 and has been
\textsuperscript{25} Department of Defense, \textit{Broad Agency Announcement For Technology Development and Advanced Technology Development}
\textsuperscript{26} Carl Von Clausewitz, \textit{On War}, Translated by Michael Howard and Peter Paret, (Princeton University Press, 1976), Book 1, Chapter 7.
\textsuperscript{27} Higinio Gonzales-Jorge et. al., \textit{Unmanned Aerial Systems for Civil Applications: A Review}, (MDPI: July 2017), 1–2, https://doi.org/10.3390/drones1010002
\textsuperscript{28} Jack Miller, “Strategic Significance of Drone Operations for Warfare,” \textit{E-International Relations}, (August 2013), https://www.e-ir.info/2013/08/19/strategic-significance-of-drone-operations-for-warfare/.
\textsuperscript{29} Milena Sterio, “The United States’ Use of Drones in the War on Terror: The Legality of Targeted Killings under International Law,” \textit{Case Western Reserve Journal of International Law} 45 (2012), 198–200, https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1072&context=jil.
\textsuperscript{30} Miller, “Strategic Significance of Drone Operations for Warfare,” 2013.
used extensively by U.S. SOF teams in nearly every region.\textsuperscript{31} The emergence of advanced commercial sUAS, such as the Chinese-made DJI, and their potential uses on the battlefield have led to significant efforts by the DOD to field similarly capable systems. Notably, UAS platforms have been substantially developed to include Vertical Take-Off and Landing (VTOL), complex camera systems, and smaller and more agile platforms. As a result, the DOD launched the Rucksack Portable UAS (RPUAS) program of record\textsuperscript{32} while the Defense Innovation Unit (DIU) initiated the Blue UAS program, both designed to introduce inexpensive, rucksack-portable, VTOL-capable sUAS systems to the battlefield.\textsuperscript{33}
In 2013, the U.S. Army published capability requirements for the next generation of sUAS designed to enhance the situational awareness of small unit commanders.\textsuperscript{34} The document described production threshold requirements, the minimum capabilities necessary for a sUAS to be considered for the program of record, and production objective requirements, the desired capabilities for a sUAS to move forward towards product development.\textsuperscript{35} Key production objectives and production threshold requirements include; a handheld system capable of being launched without dedicated devices and a compact system capable of being transported in a rucksack. Additional requirements can be seen in Table 1.
\textsuperscript{31}Department of Defense, \textit{RQ-11B Raven Small Unmanned Aircraft System (SUAS)} (Washington, DC: Department of Defense, 2016), https://asc.army.mil/web/portfolio-item/aviation_raven-suas/
\textsuperscript{32} Department of Defense, \textit{Capability Production Document For Rucksack Portable Unmanned Aircraft System (RPUAS) Increment 2}, (Washington, DC: Department of Defense, 2013).
\textsuperscript{33} Department of Defense, \textit{Defense Innovation Unit Announces sUAS Product Availability to Provide Secure, Capable Small Unmanned Aerial Systems for Critical Uses Across the Government} (Washington, DC: Department of Defense, 2020) https://www.defense.gov/Newsroom/Releases/Release/Article/2318799/defense-innovation-unit-announces-suas-product-availability-to-provide-secure-c/#:~:text=The%20Defense%20Innovation%20Unit%20(DIU,options%20to%20the%20U.S.%20Government.
\textsuperscript{34} Department of Defense, \textit{Capability Production Document For Rucksack Portable Unmanned Aircraft System (RPUAS) Increment 2}.
\textsuperscript{35} Department of Defense, \textit{Capability Production Document For Rucksack Portable Unmanned Aircraft System (RPUAS) Increment 2} (Washington, DC: Department of Defense, 2013).
| Joint Capability Area | Production Threshold | Production Objective |
|-----------------------|--------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------|
| 2. Battlespace Awareness
2.1 Planning & Direction
5. Command & Control
5.1 Organize
5.2 Understand
5.5 Direct | 30-minute time of flight and a flight range of 3km | 45-minute time of flight and a flight range of 5km |
| 2. Battlespace Awareness
2.1 Planning & Direction
3. Force Application
3.1 Maneuver | - Payload with sufficient resolution for an operator to have a 90% Probability of Detection (PD) of a man-sized target during day at 300m and 200m at night.
- 90% PD of a vehicle during day at 400m and 300m at night.
- 90% PD of a vehicle or person during day at 250m and 150m at night. | - Payload with sufficient resolution for an operator to have a 95% PD of a man-sized target during day at 600m and 450m at night
- 95% PD of a vehicle during day at 800m and 600m at night
- 95% PD of a vehicle or person during day at 600m and 450m at night |
| 3. Force Application
3.1 Maneuver | - Contain one handheld ground control station (H-GCS)
- Weigh no more than 19lbs | - Contain one handheld H-GCS
- Weigh no more than 8lbs |
| 2. Battlespace Awareness
3. Force Application
3.1 Maneuver
7. Protection
7.2 Mitigate | - Inaudible at 200 feet AGL with a background noise of 65 dBA | - Inaudible at 100 feet AGL with a background noise of 35 dBA |
| 2. Battlespace Awareness
2.1 Planning & Direction
2.2 Collection
3. Force Application
5. Command & Control
6. Net-Centric | - The system must have a modular FMV payload containing day, night (passive infrared), and laser illuminator.
- The system must have the ability to observe a stationary object/location while sending and receiving C2 data to/from the H-GCS.
- The H-GCS display must have the detail/quality of a Soldier with 20/20 vision observing the object. | - The system must have a modular FMV payload containing day, night (passive infrared), laser illuminator, and Laser Target Marker).
- Both day and night cameras must have optical zoom capability |
---
36 Department of Defense, *Capability Production Document For Rucksack Portable Unmanned Aircraft System (RPUAS) Increment 2*.
Additionally, a key component of both the RPUAS and Blue UAS programs is ensuring the security and safety of any potential sUAS systems introduced into the DOD. To secure the integrity of UAS platforms and mitigate the risks of foreign intrusions into the supply chain, SRR and Blue UAS were both designed to comply with Section 848 of the *National Defense Authorization Act* (NDAA) for Fiscal Year 2020.\(^{37}\) This section prohibits the use or procurement of foreign-made UAS platforms and attempts to prevent foreign adversaries, including China, from compromising sensitive areas of DOD research.\(^{38}\) As a result of 18-months of testing and supply chain inspection, DIU and the DOD announced the availability of five UAS options able to be purchased by DOD organizations in September 2020 including: Altavian, Parrot, Skydio, Teal, and Vantage Robotics.\(^{39}\) The SATLAS project team was able to acquire three Altavian M440s for testing and prototype development and plans to eventually integrate the Skydio X2D.
2. **Object Recognition**
As sUAS platforms now play a significant role in increasing the situational awareness of ground forces, the employment of object recognition algorithms is even more feasible. Object recognition is a longstanding problem within computer vision but is an area in which deep learning techniques have enabled recent breakthroughs.\(^{40}\) The goal of object recognition is to determine whether specific objects from given categories (e.g., humans, vehicles, or weapons) are present in an image. Deep learning allows for the use of multilayered algorithms to enable software to learn the representation of images through multiple levels of abstraction.\(^{41}\) This type of learning allows algorithms to be trained using
\(^{37}\) The Department of Defense, *Defense Innovation Unit Announces sUAS Product Availability to Provide Secure, Capable Small Unmanned Aerial Systems for Critical Uses Across the Government*.
\(^{38}\) National Defense Authorization Act for Fiscal Year 2020, S.1790, 116th Congress (2019-2020) https://www.congress.gov/bill/116th-congress/senate-bill/1790/text.
\(^{39}\) The Department of Defense, *Defense Innovation Unit Announces sUAS Product Availability to Provide Secure, Capable Small Unmanned Aerial Systems for Critical Uses Across the Government*.
\(^{40}\) Li Liu et al., “Deep Learning for Generic Object Detection: A Survey,” *International Journal of Computer Vision* 128, no. 2 (February 2020): 261–318, https://doi.org/10.1007/s11263-019-01247-4.
\(^{41}\) Yann LeCun, Yoshua Bengio, and Geoffrey Hinton, “Deep Learning,” *Nature*, no. 7553 (May 2015): 436–44, https://doi.org/10.1038/nature14539.
known data sets on which objects to recognize and can be tailored to best meet the needs of the operator.
The use of object recognition in military applications has been considered in several projects and studies, including the highly publicized Project Maven\textsuperscript{42}; however, this capability has yet to be implemented nor have the requirements for DOD use been clearly defined.\textsuperscript{43} ISR systems capable of accurately recognizing potential threats on the battlefield have the potential to significantly improve the survivability of SOF teams.
One common critique of using object recognition to assist military operations is the question of accuracy. Object recognition performance is often evaluated using three criteria: frames per second, precision, and recall. Precision is a measure of how frequently an algorithm correctly recognizes an object.\textsuperscript{44} Recall measures whether the algorithm recognized an object every time it should.\textsuperscript{45} As an algorithm’s recall rate increases, its precision often decreases creating the precision-recall curve (Figure 1). The area underneath the precision-recall curve is referred to as the average precision and indicates correct guesses on object recognition based on the correct number of times the algorithm should have made a guess. Thus, an algorithm can be set on a sensitivity continuum to either make only correct guesses while missing opportunities in which it should have guessed (false negative) or to make guesses at every opportunity which will result in inaccurate guesses (false positives) or somewhere in the middle. This has significant implications for use by the DOD, especially with human-in-the-loop systems. An operator
\textsuperscript{42} Lucy Suchman, “Algorithmic Warfare and the Reinvention of Accuracy,” \textit{Critical Studies on Security} 8, no. 2 (May 3, 2020): 175–87, https://doi.org/10.1080/21624887.2020.1760587.
\textsuperscript{43} Doaa Mohey El-Din, Aboul Ella Hassanein, and Ehab E. Hassanien, “An Automatic Detection of Military Objects and Terrorism Classification System Based on Deep Transfer Learning,” in \textit{Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020)}, ed. Aboul-Ella Hassanein et al., Advances in Intelligent Systems and Computing (Cham: Springer International Publishing, 2020), 594–603, https://doi.org/10.1007/978-3-030-44289-7_56; Zhi Yang et al., “Deep Transfer Learning for Military Object Recognition under Small Training Set Condition,” \textit{Neural Computing and Applications}, no. 10 (October 1, 2019): 6469–78, https://doi.org/10.1007/s00521-018-3468-3.
\textsuperscript{44} Shivy Yohanandan, “MAP (Mean Average Precision) Might Confuse You!,” Medium, June 9, 2020, https://towardsdatascience.com/map-mean-average-precision-might-confuse-you-5956f1bfa9e2.
\textsuperscript{45} Yohanandan, “MAP (Mean Average Precision) Might Confuse You!”
can opt to set the level of sensitivity to mitigate risk during high consequence scenarios\textsuperscript{46} in order to sacrifice some precision to increase recall abilities.

**Figure 1.** Precision-Recall Curve\textsuperscript{47}
### D. PRIOR WORK
This section provides an overview of research that informed this thesis. These research efforts are addressed individually in the following sections.
#### 1. Deep Learning and sUAS Object Recognition
Recent advancements may allow deep learning (DL) algorithms to enable UAS platforms to detect threats and autonomously avoid obstacles. The use of DL techniques to recognize patterns from raw data captured by onboard cameras could increase the autonomous functionality of UAS platforms.\textsuperscript{48} Differing from classic machine learning, DL does not require the use of descriptor labels to categorize data. Instead, DL techniques can both identify and categorize data simultaneously. In essence, DL algorithms process raw video from camera systems or sensors onboard UAS and determine if the data represents a threat. Fraga-Lamas et. al. proposed a cloud-based communication system that
---
\textsuperscript{46} DataLabeler L, “Human-in-the-Loop Machine Learning Approach,” Medium, March 24, 2020, https://datalabeler.medium.com/human-in-the-loop-machine-learning-approach-b130102b94e5.
\textsuperscript{47} Joe Kehoe, email message to author, May 7, 2021.
\textsuperscript{48} Paula Fraga-Lamas et. al., “A Review on IoT Deep Learning UAV Systems for Autonomous Obstacle Detection and Collision Avoidance,” *Remote Sensing* 11, no. 18 (January 2019): 2144, https://doi.org/10.3390/rs11182144.
can contain the required deep learning algorithms for object recognition. The UAS could then automatically reposition itself to avoid objects, maintain its stealth, or alert the operator. Deep learning-enabled object recognition and cloud-based communication techniques are major considerations in this thesis’ proposed solution to increase situational awareness for SOF teams.
2. SQUAD X Experiments
Between 2018 and 2020, the DOD’s Defense Advanced Research Projects Agency (DARPA) conducted a series of experiments, labeled SQUAD X, to test the impact of enhancing U.S. Marine Corps squads with DL-enabled robots.\(^{49}\) DARPA also employed a cloud-based communication architecture connected to ground stations that controlled aerial and land-based robots. Both robots employed a version of AeroVironment’s (formerly Progeny Solutions) Surveillance, Persistent Observation and Targeting Recognition (SPOTR) suite. While focusing on developing modular and open architecture-based software, AeroVironment integrated computer vision analytics, namely object recognition, and machine learning through deep neural networks to develop their SPOTR technology.\(^{50}\) SPOTR has been tailored for use in unmanned applications through its embedded and edge-processing configurations and, once integrated into a UAS’ computer vision, enables the system to recognize and detect threats. SPOTR employs complex algorithms and training sets to detect, recognize, categorize, and track potential threats. Detection implies that SPOTR discovers than an object is present through processing camera footage. The object is then recognized as an object that SPOTR has been trained to identify. It is then categorized as the specific trained object (a weapon, person, or vehicle in our case). SPOTR then follows the object and tracks its movement. As seen in Figure 2, potential threats are identified to the operator by outlining the object with a green box in the user interface. A single platform can track multiple threats.
\(^{49}\) Defense Advanced Research Projects Agency, “With Squad X, Dismounted Units Partner with AI to Dominate Battlespace.” (July 2019): https://www.darpa.mil/news-events/2019-07-12
\(^{50}\) Daniel Midgett, email message to author, September 4, 2020.
SPOTR Object Recognition Model\textsuperscript{51}
During a series of four experiments, AeroVironment’s SPOTR software was integrated into UASs to enable U.S. Marines tasked to execute a series of operations in urban areas.\textsuperscript{52} DARPA discovered that not only could the object detection algorithms significantly increase the situational awareness of ground forces, it also provided the forces enough digestible information to adjust their ground scheme of maneuver without cognitive overload when the data was shared among the team through the Android Tactical Assault Kit (ATAK).\textsuperscript{53} Additionally, feedback from the Marine squad members demonstrated the user-friendly nature of the system. The users also gained trust in the reliability of the system after a single iteration.\textsuperscript{54} SQUAD X demonstrated that it is feasible to employ object recognition capability in a human-in-the loop system to increase situational awareness for ground forces. The tool must not cognitively overload the operator, and trust in the tool can be built through reliable detection of enemy threats. SPOTR is the software that we evaluate for its object recognition capabilities.
\textsuperscript{51} AeroVironment, “SATLAS SPOTR Metrics”.
\textsuperscript{52} Defense Advanced Research Projects Agency, “With Squad X, Dismounted Units Partner with AI to Dominate Battlespace,” (July 2019): https://www.darpa.mil/news-events/2019-07-12.
\textsuperscript{53} Keenan Kline, email message to author, November 12, 2020.
\textsuperscript{54} Keenan Kline, email message to author, November 23, 2020.
3. **Object Recognition and Super-Resolution**
Developing trust in object recognition systems requires accurate and reliable detections across all conditions. Traditional object recognition is usually performed when images that the algorithm is trained to detect occupy a large portion of the image frame. This technique is largely dependent on the quality of the training data, or group of images used as samples to train deep neural networks on what to detect, and the quality of the image observed. All object recognition models require a certain number of pixels to recognize an item. As the quality of observed images decreases, the risk of mis-categorization or completely missed items increases. Nearly all object recognition training data introduce some level of image degradation to allow for accurate detection when items are small or are partially obscured. This is especially important when considering sUAS which are equipped with smaller, less capable cameras to minimize weight and remain man packable. Additionally, SOF operations often occur in environments with limited visibility, and required standoff that stress traditional camera systems, incurring risk to the team.
In 2019, Christoph Borel-Donohue and Susan Young proposed super-resolution as a technique to increase accurate object recognition rates on degraded images.\(^{55}\) They used low-resolution images of parking lots and fed them into the You Only Look Once (YOLO) object recognition network to test the number of cars and trucks detected. After the low-resolution frames were scanned by YOLO, they processed the images through a super-resolution algorithm to produce full size images then rescanned them. Their findings show that the number of detections improved two-fold after the images were super-resolved and matched the detection results of an image four times its size. Each object recognition model requires different image sizes and qualities for accurate detection; however, introducing a super-resolution algorithm can help increase detection accuracy while avoiding increased hardware or payload requirements. This suggests that super-resolution algorithms may provide a method to increase object recognition capabilities while avoiding increased sUAS payload weights. This technique informed our analysis of the relationship between
\(^{55}\) Christoph Borel and S. Young, “Image Quality and Super Resolution Effects on Object Recognition Using Deep Neural Networks,” in 2019 SPIE Conference for Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications (SPIE, 2019), 7–8, https://doi.org/10.1117/12.2518524.
object recognition algorithms and onboard camera systems and presents opportunities to improve the range of SPOTR while minimizing weight.
4. **AI Robots and Increased Combat Effectiveness**
There are several important implications for the use of DL-enabled sUAS organic to a SOF team. In 2020, Midgett et. al. analyzed simulation data from the Maneuver Battle Lab at Fort Benning, GA to estimate the additional combat strength gained by augmenting U.S. Mechanized Infantry platoons with AI-enabled robots and precision strike capabilities.\(^{56}\) The lab provided data from four controlled simulations in which the simulated engagements did not include AI-enabled robots, and from nine experiment simulations that included the robots. The robots employed deep neural network (DNN) AI and comprised armed ground robots, armed aerial robots, and company-level precision strike robot systems.
Midgett et. al. analyzed the data from simulated engagements between friendly mechanized infantry platoons and enemy forces that ranged in size from a platoon to a battalion. They found a strong statistical significance ($r = 0.96$) between the use of armed aerial robots and precision strikes and improved platoon-level combat effectiveness. Furthermore, they assessed that the addition of AI robots and precision strikes accounted for 92% of the platoon’s increase in combat effectiveness. They were unable to determine with any statistical significance whether the use of ground robots impacted combat effectiveness but found that the aerial robot systems could explain 56% of the observed effects of engagements. As seen in Figure 3, this finding suggests that there may be merit in reexamining the traditional rule of only attacking when one holds a three to one force advantage over an opponent. For the purposes of this thesis, Midgett et. al. demonstrated the significant advantage that AI-enabled sUAS might provide to small teams and strengthened our notion to focus on integrating inexpensive systems for SOF teams.
\(^{56}\) Midgett et. al., “Semiautonomous Threat Learning Alert System,” 46–52.
Since the concept of using an sUAS platform with an object recognition tool to increase SOF situational awareness is only theoretical, the first step in this thesis is to assess whether the integration of object recognition software onto a versatile and robust UAS platform is feasible. This thesis focuses on Pillar 2 while managing the integration into a specific sUAS platform. The next chapter describes the research process, experiment design, execution, and the results.
---
57 Midgett et. al., “Semiautonomous Threat Learning Alert System,” 46–52.
III. EXPERIMENT DESIGN
This chapter describes the series of experiments conducted to evaluate the object recognition integration and our findings. We tested the performance of AeroVironment’s SPOTR object recognition algorithm to determine the feasibility of integrating it into a surrogate sUAS platform to enhance situational awareness for SOF units.
We conducted our experiments in four phases. During Phase 0 we participated in simulation software validation with AeroVironment engineers, and to become familiar with their progress in coding SPOTR’s ability to detect and categorize individuals and vehicles in a fully simulated environment. In Phase 0 we sought to determine whether the simulated environment that we had selected could adequately and reliably represent the ability of SPOTR to process raw data from an ArduCopter sUAS platform and categorize moving entities as individuals, weapons, or vehicles. We refined and scoped our draft research questions and measures of performance in order to transition to Phase I.
Phase I consisted of discovery experiments using an Alienware laptop loaded with the SPOTR software and the simulated environment. The simulated environment was a synthetic representation of the Urban Training Center at the U.S. Marine Corps base in Quantico, VA. This phase allowed us to examine whether the simulation capabilities through multiple iterations of runs and narrow our research questions while collecting SPOTR performance data. The Alienware laptop provided sufficient processing power to support the simulation and SPOTR software without limiting performance. This allowed us to become familiar with SPOTR in a fully unconstrained processing power environment.
Phase II consisted of initial evaluation experiments to limit the processing load available to SPOTR to that available onboard current sUAS to determine the feasibility of integrating the two. We hypothesized that onboard processing power would be sufficient to reliably run the algorithms and wanted to measure the impacts of a constrained environment on the software.
Phase III was designed to test whether the surrogate sUAS could support the object recognition algorithms. This phase involved transitioning from the simulated environment to
a field environment to measure the impact on platform and software performance once integrated. The experiments were designed to be basic but provide evidence to further advance the project to determine the feasibility of eventually introducing the technology into the DOD. Figure 4 describes our experiment design plan.
Each phase of the experiment campaign was designed with a systems approach in mind and considered the parameter space investigation (PSI) method as well as the DOD’s Code of Best Practices for Experimentation. Section A describes the design methodology while Section B details the findings for each phase.
A. EXPERIMENT DESIGN METHODOLOGY
The PSI method, or Multicriteria Analysis, is designed to meet the demands of engineer optimization problems and one that offers important considerations for our project. R. Statnikov et. al. describes this method as a process of correctly identifying a problem and then constructing and analyzing a feasible solution.\(^{58}\) Important features of this method are
\(^{58}\) R. Statnikov et. al., “Multicriteria Analysis Tools in Real-Life Problems,” *Computers & Mathematics with Applications* 52 (2006) 1–32. https://doi.org/10.1016/j.camwa.2006.08.002
the design variables, functional constraints, and criterion variables. Design variables are often independent variables and the factors thought to be responsible for change in performance. These variables are often limited due to the available resources or technology and often require extensive market research to properly identify. Functional constraints are factors that often fall outside of the intended area of interest yet play an important role in the design and execution of any experiment. These constraints include factors such as the time available, testing sites, and weather, which must also be properly considered. Finally, criterion variables are often those considered to be essential by the designer for the proposed solution to be feasible. These variables may involve a required time of flight, a flight range, or the amount of data able to be processed. Table 2 lists the design variables, functional constraints, and criteria constraints specific to this project. The following section outlines how each impacted this study.
Table 2. Design, Functional, and Criterion Variables\textsuperscript{59}
| Design Variables | Functional Constraints | Criterion Variables |
|----------------------------------|---------------------------------|-----------------------------------|
| sUAS altitude | Software integration timeline | SPOTR accuracy |
| sUAS Slant Range Distance from entity | Testing Window | Number of entities detected |
| Number of entities | Test environment | Maximum distance of detection and categorization |
| Target location | | |
The following section describes our down select process and how each of these variables and constraints impacted our study and influenced our results.
1. Down Select Considerations
We initially selected specific hardware and software products for our study. In most cases, several options of each product were available to our team but only one could move
\textsuperscript{59} R. Statnikov et. al., “Multicriteria Analysis Tools in Real-Life Problems,” 1-32.
forward in the experiment phases. In some cases, only one product was available. The following section describes the products that we selected for our experiments.
a. **SPOTR Object Recognition Software**
As discussed in Chapter II, AeroVironment’s SPOTR is the only object recognition software that we considered which is designed to be integrated with sUAS and able to detect potential threats to ground forces. SPOTR is unique in its ability to detect objects at the edge. The data is streamed directly from the platform to the operator’s GCS component and it can be integrated into the onboard computer vision of most sUAS platforms.\(^{60}\) The SPOTR includes a NVIDIA Jetson TX2 processor, a camera system capable of EO/IR configurations and a Microhard pDDL data radio. Once integrated into a sUAS platform, SPOTR employs custom-tailored DNN and DL algorithms that detect patterns consistent with known targets. As seen in Figure 5, SPOTR is being designed to detect, categorize, localize, and then track (DCLT) potential targets based on identifiers detected during training and validation.

The object recognition algorithms currently used by the SPOTR software support detection in three categories: individuals, weapons, and vehicles. However, the version used
\(^{60}\) Daniel Midgett, email message to author, September 4, 2020.
\(^{61}\) Daniel Midgett, email message to author, September 4, 2020.
in our laptop-based simulation testing was limited to two categories: individuals and vehicles. This was the only model ready to be downloaded onto a third-party computer.
b. Platform
The SATLAS team originally selected the Altavian M440 as our preferred sUAS platform for prototype development and testing; however, discussions with the manufacturer about integration and the requirement of non-disclosure agreements prevented the Altavian from being available. While AeroVironment (formerly Progeny Solutions) and Altavian worked through the bureaucratic requirements, testing moved forward with the Nibbler sUAS platform.
Although limited on advanced technology, the Nibbler sUAS platform has been successfully fielded with the U.S. Marine Corps. It can be 3-D printed and assembled and repaired at the unit level.\(^{62}\) Not only does this keep the platform relatively cheap (costing around $2,000 per platform) but it also avoids the extensive DOD acquisition process.\(^{63}\) The Nibbler is a small, lightweight, VTOL-capable, four rotor quadcopter fitted with a single lens camera capable of visible detection (Figure 6). It has a 20-minute time of flight and was designed to increase situational awareness by conducting reconnaissance in support of small units. It was designed and developed through a collaborative effort between the MITRE Corporation and the U.S. Marines.
\(^{62}\) Megan Eckstein, “Marines’ 3D-Printed ‘Nibbler’ Drone Creating Lessons Learned on Logistics, Counter-UAS,” *USNI News*, (September 2017), https://news.usni.org/2017/09/27/marines-3d-printed-nibbler-drone-creating-lessons-learned-logistics-counter-uas.
\(^{63}\) Bill Eidson, “Nibbler Drone Is an Advanced Manufacturing ‘Flagship’ for Marines,” *MITRE*, (January 2019), https://www.mitre.org/publications/project-stories/nibbler-drone-is-an-advanced-manufacturing-flagship-for-marines.
Engineers from AeroVironment have worked extensively with the Nibbler and, therefore, integration with this platform was not an issue. The Nibbler is approved for use by the DOD and has been employed almost solely by the U.S. Marines since 2017. However, the Nibbler was not considered by the RPUAS program due to its limited autonomous capability. Nonetheless, it served adequately as the surrogate for our research pertaining to object recognition.
c. Microprocessor
The NVIDIA Jetson TX2 microprocessor is considered the fastest and most power-efficient microchip for advanced AI computing\(^{65}\) and is the only microprocessor used by AeroVironment. The TX2 has 8 GB of memory and uses 7.5 watts of power to enable on-the-edge AI computing. The TX2 is one of the most common microprocessors employed for AI processing. The TX2 was the only processor used during our experiments. Results on other microprocessors may vary.
d. Onboard Camera
The simulated environment and live experiments employed an onboard camera system equivalent to the GoPro Hero 4 Silver. This is the camera available on the Nibbler and
---
\(^{64}\) Bill Eidson, “Nibbler Drone Is an Advanced Manufacturing ‘Flagship’ for Marines,”.
\(^{65}\) NVIDIA, “Jetson TX2 Module,” NVIDIA Developer, (May 2017), https://developer.nvidia.com/embedded/jetson-tx2.
the specifications of the simulated environment were adjusted to match. The Hero 4 records video in 1080p resolution at 30 frames per second and operates at a super wide, wide or narrow field of view.\textsuperscript{66} The GoPro Hero 4 is primarily designed to record objects in close proximity. The lack of zoom capabilities limits its performance as compared to other sUAS onboard cameras. For our research, this restricted the range at which SPOTR was able to detect and categorize entities.
\textbf{e. Simulation Software}
We used AeroVironment’s simulation as the environment to evaluate the SPOTR software while integration efforts were ongoing. To examine the capabilities of SPOTR, we loaded the simulated environment on the Alienware laptop. The laptop provided an unconstrained setting for the software to perform its tasks.
A constraint for this study was that the only simulated environment available for experimentation was the one created by AeroVironment. The simulation is designed to replicate the Urban Training Center at the U.S. Marine Corps base in Quantico, VA. It incorporates a small urban area of approximately 150 buildings while the rural areas are limited to open fields. This restricted our tests to take place in a temperate environment only. Additionally, the standard version of the simulation limits the number of detectable objects to 13 individuals, 13 weapons, and 1 vehicle depending on the region scanned. This limited our ability to detect more than 13 objects simultaneously.
2. \textbf{Design Variables}
Design variables are often described as the independent variable.\textsuperscript{67} They are the knobs that we turn in order to measure the impacts. We selected the following four design variables specific to this part of the project include: 1) operating altitude of the sUAS, 2) the slant range distance between the sUAS and the entity, 3) the number of entities available for detection and categorization, and 4) target location. During our early test phases, we conducted
\textsuperscript{66} GoPro, \textit{GoPro Hero 4 Silver User Manual}, 2014. https://gopro.com/content/dam/help/hero4-silver/manuals/UM_H4silver_ENG_REVA_WEB.pdf.
\textsuperscript{67} R. Statnikov et. al., “Multicriteria Analysis Tools in Real-Life Problems,” 1-32.
discovery experiments to determine the appropriate parameters of our independent variables as they had not yet been specified.
a. **sUAS Altitude**
The altitude of the sUAS was the most easily manipulable design variable and revealed the most about SPOTR’s capabilities. In both the simulation and field tests, the altitude of the virtual ArduCopters could be adjusted in five-meter increments using the mission control panel in the application screen. SPOTR is trained to detect entities based on pattern recognition and pixel size. Increasing the sUAS altitude reduced the pixel size of the detection. By adjusting the altitude, we identified optimal performance parameters and limitations of SPOTR to detect and categorize entities based on the available experiment settings and conditions.
b. **Slant Range Distance from Entity**
Similar to altitude, the distance between the entity and the sUAS was easy to manipulate and impacted the number of pixels available for SPOTR to detect and categorize entities. This distance could be adjusted using the mission control panel to alter the flight path of the drone either manually or by inputting a route for the sUAS to automatically fly. Changes in distance and altitude showed similar impacts on SPOTR’s accuracy and were recorded as the slant range distance as discussed in Chapter II. From these, we established initial performance parameters.
c. **Number of Entities**
An important research question for the SATLAS project involves the maximum number of entities SPOTR is able to detect and categorize simultaneously. To measure this, we manipulated the number of entities available to be detected and categorized. The intent was to identify the limitations of the system and direct the necessary design adjustments to meet our evaluation criteria.
d. **Target Location**
Target location is important as pixel size and contrast directly impact object recognition capabilities. Within a given test environment, shadows, vegetation, and dark backgrounds negatively impact SPOTR’s ability to detect and categorize entities. We measured detection and categorization accuracy in various locations within the available testing environments to evaluate these impacts. Entities within the simulation travel on programmed routes and are not easily adjustable. We were, however, able to select different regions within the simulated test environments that offered varying conditions of shadows and background contrast. Target location proved much easier to manipulate during the field experiment; live targets could travel within any micro-terrain at the test site. These variations enabled us to gather initial data regarding the impacts of vegetation, shadows, and varying backgrounds on SPOTR accuracy. We used those data to guide the software developers.
3. **Functional Constraints**
Dr. Alberts describes functional constraints as variables or environmental factors accepted by the designer.\(^{68}\) These constraints impact the relationship between design variables and the criteria constraints and directly influence experiment results. Several functional constraints impacted this research and the results that follow.
a. **Software Integration Timeline**
This study relied on government funding and commercial industry experts to successfully integrate object recognition software into a sUAS platform. As a result, the experiments were limited to testing the products available within the scope of what could be produced and funded in the given time. This timeline was further constrained by an 18-month academic period. These constraints limited testing window and required the study to employ a simulated environment while observing remotely. This did not allow the team to test the Altavian and Skydio platforms, and required the use of the Nibbler sUAS platform to evaluate the object recognition performance.
\(^{68}\) David S. Alberts and Richard E. Hayes, *Code of Best Practice for Experimentation*, CCRP Publication Series ([Washington, D.C.: DOD Command and Control Research Program, 2002](http://dodccrp.org/files/Alberts_Experimentation.pdf), 68-73, http://dodccrp.org/files/Alberts_Experimentation.pdf)
b. Testing Window
As a result of the software integration timeline constraint, the timeline for testing was limited to a period of six weeks. This constraint, and the required coordination with industry partners, meant that the experiments had to remain relatively small and necessitated the use of simulations and subsequent observing field experiments.
c. Test Environment
The testing environment was limited to what was available in the prototype developers’ virtual environment simulating a training site at the U.S. Marine Corps base in Quantico, Virginia. The field test environment was an open wooded area in Prince William County, Virginia. We were relegated to temperate zones with limited foliage; follow-on research should be conducted in various environments.
4. Criterion Variables
Criterion variables are defined as the dependent variables of the experiment and are the outputs. These can be thought of as the behaviors the system will perform as a function of technical capabilities and operator settings.\(^{69}\) Prior to the experimentation phase, we identified several criteria variables that we believed would be of significance in determining the feasibility of employing the object recognition software to increase the situational awareness of ground forces.
This part of the longitudinal study focused on discovery testing and, as such, our criteria variables were defined as: 1) the ability of the object recognition software to accurately detect and categorize entities, 2) the number of entities capable of being detected and categorized simultaneously, and 3) the slant range distance at which targets can be accurately detected and categorized. Our initial research questions addressed the capabilities of the object recognition algorithm.
Detection was defined as a binary yes or no that the software successfully registered that an entity was present. Categorization was defined as accurately classifying the entity as a
\(^{69}\) Alberts et. al., *Code of Best Practice for Experimentation*, 68–73.
weapon, person, or vehicle. Accuracy was measured as a function of the number of entities (individuals, weapons, and vehicles) correctly detected and categorized versus the number of actual entities present. These measurements were taken at the optimal performance altitude based on the pixel size of the entity and the training data used to recognize the entity. The number of entities capable of being accurately detected and categorized was intended to stress the SPOTR software and determine its limits. Similarly, we manipulated the distance between the drone and the simulated entities to identify the range limits at which the platform could accurately detect and categorize. Simulated environments were used to examine the functionality of this software while acknowledging that real-world performance may vary significantly. Table 3 defines our technical requirements compared to the RPUAS requirements discussed in Chapter II. Our distances are defined as the slant range distance between the sUAS and the entity as we assume SOF teams will avoid operating a sUAS directly overhead to prevent compromising their position. Instead, we assess that a sUAS will operate at a minimum offset distance away from the team.
Table 3. SATLAS and RPUAS Requirements\(^{70}\)
| Requirement Area | RPUAS Performance Requirements | SATLAS Performance Requirements* |
|-----------------------------------|---------------------------------|----------------------------------|
| Detection Accuracy | -90% PD: | -90% PD: |
| | Day | Night | Day | Night |
| Person | 300m | 200m | 300m | 200m |
| Vehicle | 400m | 300m | 400m | 300m |
| Weapon | 200m | 150m | | |
| Categorization Accuracy | N/A | -90% PC: |
| | | | Day | Night |
| Person | 100m | 75m | | |
| Vehicle | 200m | 150m | | |
| Weapon | 75m | 50m | | |
| Number of Entities Detected/Categorized | N/A | Squad-sized element (approximately 10–12) detected |
| Noise | Inaudible at 200 feet AGL | Inaudible at 200 feet AGL |
| Flight Range | 3 km | 3 km |
| Time of Flight | 30-minutes | 30-minutes |
*This was measured for temperate zones. Additional testing will be required in varying environments.
\(^{70}\) Department of Defense, *Capability Production Document For Rucksack Portable Unmanned Aircraft System (RPUAS) Increment 2*.
a. **Detection**
We determined that the RPUAS accuracy requirements for personnel and vehicle detection were sufficient to support SOF operational requirements and, therefore, sufficient for SATLAS experimentation criteria. The detection of personnel at 300 meters places them outside the range of typical small arms fire and allows sufficient reaction time for a team to maneuver the sUAS closer to investigate or take appropriate action. Likewise, detection of vehicles at 400 meters increases standoff distance and allows a SOF team to react accordingly. As discussed in Chapter II, smaller targets create less pixels for the object recognition software to process and are more difficult to detect. While weapon detection at 200 meters places SOF teams within small arms range, it is more realistic given the distance requirements for personnel and vehicle entities. Additionally, the accuracy requirement of a 90% probability of detection (PD) establishes a reliable detection model that will create trust in the system.
b. **Categorization**
The U.S. Army did not factor in object categorization since it was not a RPUAS technical requirement; however, it is exceptionally important for our project due to its potential to increase situational awareness for SOF teams. We defined the minimum categorization distance for vehicles to 200 meters during day at 150 meters at night with a 90% probability of categorization (PC). Personnel should be categorized at 100 meters during the day and 75 meters at night with a 90% PC and weapons should be categorized at 75 meters during the day and at 50 meters at night with a 90% PC. Categorization requires multiple detections before the SPOTR software is confident enough to label an entity as a vehicle, person, or weapon, thus these distances will be much closer than detection distances. Detection at the specified distances will provide sufficient standoff for SOF teams to maneuver the sUAS to a closer distance to enable successful categorization.
c. **Tracks**
The U.S. Army also did not define a minimum number of entities that the object recognition software should be able to detect and track simultaneously. This is also important to SATLAS because we assess that simultaneously detecting 10 entities would
provide sufficient situational awareness to deployed SOF teams. A key consideration will be to balance the frame rate for the object recognition software against additional power requirements for the platform.
d. Noise
We determined that the RPUAS noise requirements were sufficient to support SOF operational requirements and sufficient for SATLAS experimentation criteria. Remaining inaudible at 200 feet AGL enables a sUAS to remain outside of the required detection range for both personnel and vehicles. This provides sufficient standoff distance and will mitigate the extent to which a sUAS could compromise a SOF team’s location.
e. Flight Range
We determined that the RPUAS flight range requirement was sufficient for SOF operational requirements as well as for SATLAS technical parameters. Flight range remains dependent on a direct line-of-sight between the ground control station and a sUAS. Current state of the art sUAS technology is mostly limited to a 3-kilometer flight range due to the increased signal strength required to operate outside of this range and the complexities involved in operating a sUAS beyond-line-of-sight. Exceeding a 3-kilometer flight range requirement will severely limit the available sUAS.
Additionally, a 3-kilometer range would provide sufficient standoff for SOF teams. At an average walking speed of 3 miles per hour, this range could provide a SOF team nearly 40 minutes to react if the personnel are detected at the maximum flight range of the sUAS. Detecting a vehicle traveling at 20 miles per hour at the maximum flight range will provide 5 minutes to react. Maximum reaction time will often be preferred; however, we assess that these times will provide a sufficient reaction time for SOF teams. This will need to be evaluated in future field experiments.
f. Time of Flight
We also concur with the RPUAS requirement of a 30-minute time of flight. Like flight range, the current state of the art sUAS technology is mostly limited to a 30–35-minute time of flight. Integrating object recognition software and a robust camera into the
sUAS platform is expected to increase the power load and decrease flight time. Therefore, increasing this requirement would severely degrade available sUAS and require larger platforms with more battery life which become too big to remain man packable.
There are, however, important implications sUAS flight time will have on SOF operations. Considering the vignette in Chapter II, many SOF operations and ISR requirements exceed 30 minutes. SOF teams will be required to select the most desirable times for organic ISR coverage and carry multiple batteries and charging stations should they use these platforms. This will increase the logistical burden of teams until the technology advances beyond a 30-minute time of flight for VTOL sUAS.
5. Relationship Between Variables
We expected to discover several relationships among the variables. Within the criteria variables, the accuracy, maximum number of entities that can be detected, and maximum range at which accurate detection can occur are all dependent on the onboard camera system. The object recognition algorithms rely on a pixel size ratio to correctly categorize entities as individuals, vehicles, or weapons. And as each sUAS manufacturer uses different cameras, SPOTR could be expected to perform better on certain sUAS platforms than others. Finally, we expected SPOTR to perform better at test sites that had terrain more aligned with the training data used to develop the algorithms. We expect the data from our research to necessitate additional feedback into Pillar 1. The next section describes the phases of our experiments.
B. EXPERIMENT PHASES
The tests in each phase were designed to evaluate SPOTR performance and identify needed adjustments prior to completion of the software integration onto the platform. In Phase 0 we participated in a simulation validation with AeroVironment engineers to determine the limitations of the simulation and better define our research questions and measures of performance. In Phase I we purchased an Alienware laptop that we loaded with a version of SPOTR and a simulated environment to conduct our own experiments in a completely simulated environment. The algorithms were tested using virtual sUAS platforms hovering over the simulated training site and all data processing was done
through the laptop. We then moved on to Phase II in which the data processing was done on a Nibbler sUAS platform with an onboard NVIDIA Jetson TX2 microprocessor while operating over the same virtual training site. This represented a more constrained processing environment that could better simulate how the software would perform in a real-world scenario. Phase III then transitioned into field testing the Nibbler sUAS over Camp Snyder while detecting role players.
The experiment concluded with Phase III testing and preparation for subsequent Phase IV testing for future student teams. The next sections describe in detail the testing performed for Phases 0 – III as well as the scenarios that were used in Phases II and III.
1. **Phase 0 – Simulation Software Validation**
a. **Setup**
Phase 0 began with months of coordination with AeroVironment’s engineer team and culminated with a virtual SPOTR familiarization on April 23, 2021. The software verification used a simulated environment resembling the urban training site in Quantico, VA. Two AeroVironment engineers executed the demonstration with the NPS student team and faculty advisors through Zoom.
As seen in Figure 7, the simulation replicates a real-world urban training site to validate the SPOTR software. It primarily used light urban areas and open fields to employ SPOTR. The simulation used two ArduCopter sUAS to scan the designated areas (Figure 8). Additionally, the standard simulation setup had limited the number of entities for SPOTR to recognize to 12 individuals and 1 vehicle. Their location and movements were controlled by the simulation were unable to be manipulated under normal circumstances.
The AeroVironment engineers controlled the movement of the ArduCopters and maneuvered them through the simulated environment to demonstrate the capabilities of the simulation and SPOTR. We did not approach Phase 0 with any assumptions or research questions. We had considered measurements that may be beneficial to collect, including accuracy, number of entities detected, distance of detection, and altitude of detection; however, our intent was to determine whether the simulation provided sufficient feedback to effectively evaluate SPOTR during future phases.
b. Execution
The AeroVironment engineers initially launched the two simulated ArduCopters to demonstrate the control mechanisms, explain the view panels, and display the SPOTR software in action. We were able to observe the overview imagery and the SPOTR-enabled camera imagery (Figure 9). The left screen was used to observe the location of the ArduCopters in relation to the imagery while the right screen displayed the footage.

- through the lens of the sUAS. The ArduCopters were brought to a hover at an altitude of 15 meters AGL to demonstrate the ability of SPOTR to recognize individuals and vehicles in the simulated environment. Highlighted green boxes indicate the detection of an individual or vehicle. The ArduCopters remained over the light urban area while individuals and vehicles moved throughout. We gradually increased the altitude in 5 meter increments up to 40 meters AGL to determine the distance at which SPOTR becomes unreliable.
c. Findings
We determined that the simulation would serve as a sufficient method to evaluate SPOTR during future experiments. It provided an acceptable method to operate SPOTR in
a simulated urban environment. SPOTR was able to detect and categorize vehicles and personnel in the simulation despite being developed using live training data. Additionally, the ArduCopters could be maneuvered throughout the simulation to allow SPOTR to scan areas that offered different background contrasts. The simulation does have several limitations, however. The standard configuration limits the number of entities available for detection. Throughout most zones of the simulation, entities were limited to 8–13 personnel and one vehicle. This is a limitation that was unavailable for this thesis. Additionally, the simulation only includes urban terrain and open areas and does not have the ability to generate entities within vegetated regions. Based on the findings in Phase 0, our proposed research questions for Phase I were:
- Can the Nibbler sUAS equipped with integrated SPOTR software accurately recognize and categorize personnel and vehicles as potential threats?
- How many entities can be detected and categorized simultaneously given the current processing power?
- At what slant range can the software reliably recognize entities?
As seen in Figure 10, slant range distance factors into both sUAS altitude and lateral distance from the target and is defined as line-of-sight distance between two points.
Phase 0 concluded with revised research questions but confirmed the viability of testing SPOTR functionality in a simulated environment. Given the delays in the software integration, the ability to test SPOTR software in a synthetic environment proved beneficial. This helped us conclude that the simulation software was a viable testing platform to evaluate SPOTR, develop measurable research questions, and identify collectable measures of performance.
2. **Phase I – SPOTR Software Familiarization**
*a. Setup*
Phase I began with the purchase of an Alienware Area 51M laptop and the installation of the SPOTR software and virtual environment. We received the laptop in February 2021; however, the findings from Phase 0 enabled us to better tailor our experiments with regards to our initial research questions.
The software installed on the laptop has the same specifications as that observed during the software verification on April 23, 2021. The simulation is loaded with SPOTR’s personnel and vehicle detection model and was, therefore, unable to recognize weapons. Having unrestricted access to the software allowed us to conduct multiple experiments to
---
71 Joe Kehoe, email message to author, May 7, 2021.
test the capabilities and limitations of the software while avoiding coordination with outside organizations. Our assumptions included:
- Assumption 1: The virtual environment adequately simulates a real-world environment.
- Assumption 2: The virtual entities adequately simulate personnel and vehicles.
Additionally, our initial research questions remained consistent with the findings in Phase 0 and included:
- Can the Nibbler sUAS equipped with integrated SPOTR software accurately detect and categorize personnel and vehicles as potential threats?
- How many entities can be detected and categorized simultaneously in a constrained processing environment?
- At what slant range distance can the software reliably recognize entities?
b. Execution
Phase I experiments were conducted numerous times as we became more familiar with the software; however, our research questions remained the same. To determine how accurately the SPOTR software could detect and categorize entities, the ArduCopters were launched and hovered at the designated optimal slant range distance of 20 meters. We then counted the number of personnel and vehicles that had been observed compared to the number of those detected, and those correctly categorized. This was repeated 5 times to ensure reliability. Each iteration was recorded.
Our second research question was answered by hovering the ArduCopter at the optimal slant range distance for detection (20 meters) and measuring the number of entities detected and categorized simultaneously. Different zones were programmed with varying numbers of entities to detect; therefore, we maneuvered the ArduCopter through each zone to ensure reliability. Each zone was recorded.
Our third research question was answered using slant range to measure the distance between the ArduCopter and each entity being detected to determine the distance where detection accuracy begins to degrade. Slant range accounts for both sUAS altitude and the ground distance from the sUAS to the entity. Scans began at the optimal slant range distance of 20 meters and increased by five meters until reaching the maximum altitude of 60 meters available on the simulation. The ArduCopter remained in position while the number of targets detected was compared to the number of targets observed to determine the accuracy. This was repeated five times and the average detection percentage was recorded. As seen in Figure 11, the SPOTR software indicates a detection by highlighting the entity with a white square while items categorized are highlighted with a green square.
Figure 10. SPOTR Simulation View
c. Findings
For each launch to 20 meters AGL, SPOTR was able to detect 100% of the observable entities. This supported first research question that, at the optimal slant range distance, SPOTR is able to accurately recognize and categorize personnel and vehicles in a simulated environment.
To examine our second research question, we maneuvered the ArduCopter between zones to find its limit. Software restrictions did not allow us to fully explore this capability as we were unable to manually increase the number of detectable entities; however, we
determined that the software could detect up to 11 entities and categorize 8 simultaneously. SPOTR was not limited in the number of entities it can detect but it is currently limited to 8 simultaneous categorizations. This limit allows the system to maintain a sufficiently high frame rate for additional processing and is a restraint placed on the system by AeroVironment engineers. Future testing is planned by AeroVironment to remove this internal limitation and evaluate the limits of the software, but the current parameters are sufficient for SATLAS.
To measure our third research question, we began at the optimal slant range for detection (10 meters for weapons and 20 meters for personnel and vehicles) and increased the distance by 5-meter increments. The number of entities detected and categorized was compared to the number of entities present and recorded as a percentage. Interviews with AeroVironment engineers indicated that accurate detection would require an approximately 25–35 pixels per meter. This equated to SPOTR being able to detect weapons at approximately 10 meters – 15 meters slant range, personnel could be detected out to 40 meters slant range, and vehicles were detected out to 60 meters.
Figure 12 summarizes the findings for our third research question regarding the maximum slant range at which SPOTR is capable of recognizing personnel and vehicle entities. SPOTR was able to detect 100% of the entities up to a slant range of 40 meters. At 50 meters, the recognition accuracy dropped slightly to 90% while entities at 60 meters were only recognized at 44% accuracy. False positives became evident at 60 meters and buildings began being categorized as vehicles. Entities at 70 meters were recognized with a 33% accuracy which then dropped to 22% at 80 meters. From 80 meters to 100 meters slant range, SPOTR was able to detect entities with a 22% accuracy.
According to AeroVironment engineers, the simulated environment is primarily intended to test the functionality of the threat detection software. It did, however, enable us to measure initial performance parameters during prototype development despite caveats that real-world performance will likely vary as the training data used to tune the algorithms are better tuned to actual environments. Additionally, Phase I experiments allowed us to measure the performance of the algorithms in an unconstrained processing environment prior to moving to Phase II. Given our findings, we requested for AeroVironment to develop a method to evaluate SPOTR performance while constrained by the processing power of a NVIDIA TX2 microprocessor.
3. **Phase II – Discovery Experiments: Simulation**
**a. Setup**
Phase II experiments were conducted on May 7, 2021 and used Zoom to enable screen sharing and communication between AeroVironment engineers in Virginia and NPS students and faculty located on campus at NPS. The experiment was conducted employing the same virtual environment replicating the Urban Training Center in Quantico, VA. The primary difference for Phase II testing included the use of a hardware-in-the-loop set up to
constrain the processing power of SPOTR. As seen in Figure 13, a NVIDIA Jetson TX2 microprocessor mounted on a Nibbler was used to conduct the SPOTR processing while the virtual ArduCopter’s maneuvered through the simulated environment. Additionally,
Figure 12. Phase II: Hardware-in-the-Loop Setup\textsuperscript{72}
SPOTR’s personnel and weapon model was used instead of the personnel and vehicle model employed in Phase I. As seen in Figure 14, the simulated environment was also broken down into 8 zones with varying numbers of targets available in each.
\textsuperscript{72}Joe Kehoe, email message to author, May 7, 2021.
Incorporating the hardware-in-the-loop design did not alter our assumptions for this phase. We did, however, adjust Assumption 2 to include personnel and weapon entities while removing vehicles due to the change in detection model. The new assumptions were:
- Assumption 1: The virtual environment adequately simulates a real-world environment.
- Assumption 2: The virtual entities adequately simulate personnel and weapons.
Also, because of the varying detection model and the limited processing power, we refined our research questions to included:
- Can the Nibbler sUAS equipped with integrated SPOTR software accurately recognize and categorize personnel and weapons as potential threats?
- How many entities can be detected and categorized simultaneously in a constrained processing environment?
---
73 Joe Kehoe, email message to author, May 7, 2021.
At what slant range distance can the software reliably recognize entities?
b. Execution
Phase II testing was conducted in two separate zones within the simulation. Testing began in Zone 7 which was programmed to include 6 personnel targets all carrying weapons. To answer Research Question 1, the ArduCopters were launched and hovered at the optimal slant range distance of 20 meters. We then counted the number of personnel observed and compared this to the number of those detected as well as those correctly categorized. The ArduCopters were then lowered to an altitude of 10 meters to examine the weapons detection abilities of SPOTR. This was repeated twice for Zone 7.
We continued our experiment in Zone 7 to answer Research Question 2 by adjusting the hovering altitude from 15 meters AGL to 40 meters AGL. The ArduCopter was paused at every 5-meter increase in elevation and the number of personnel detected was compared to the number of personnel targets observed. Figure 15 displays a test iteration of SPOTR in Zone 7 at 20 meters slant range distance. After answering our two research questions in Zone 7, the ArduCopters were moved to Zone 1 to repeat the process.
Figure 14. Phase II Test of Zone 7
Zone 1 was programmed to include 13 personnel targets carrying weapons. To answer Research Question 1, the ArduCopters were brought to a hover at 20 meters altitude to examine the number of personnel targets detected. The ArduCopters were again lowered to 10 meters altitude to measure the number of weapons detected. This was repeated twice for Zone 1.
We addressed Research Question 2 by adjusting the hovering altitude of the ArduCopters between 15 meters AGL and 60 meters AGL. The ArduCopters were halted at every 5-meter increase and the number of personnel targets detected was compared to those observed on the screen.
c. Findings
For each launch to 20 meters AGL in both Zone 7 and Zone 1, SPOTR was able to detect and categorize 100% of the observable personnel. This provided the data for our first research question to assess that, while operating at the optimal slant range distance, SPOTR can accurately recognize and categorize personnel in a simulated environment. However, in Zone 7, SPOTR was unable to detect any weapons despite 6 being present at any given time. Additionally, in Zone 1, SPOTR was only able to detect 2 weapons and correctly categorize none of the weapons while up to 13 were present.
For our second research question, we found that SPOTR was able to simultaneously detect all observable personnel entities while operating at the maximum slant range distance of 20 meters. SPOTR detected all 6 personnel entities in Zone 7 and all 13 personnel entities in Zone 1 when they were within line of sight.
Figures 16 and 17 summarize our findings for our third research question regarding the maximum slant range at which SPOTR can recognize personnel entities. In Zone 7, SPOTR was able to detect 100% of the entities at a slant range of 20 meters. At 25 meters, the recognition accuracy dropped to 83%. Recognition accuracy dropped to 67% for entities at 30 meters and 35 meters while recognition accuracy dropped to 0% for entities at 40 meters and beyond. In Zone 1, SPOTR was able to detect 100% of the personnel entities between 20 meters and 30 meters. At 40 and 45 meters, the recognition accuracy
degraded to 77%. Recognition accuracy declined to 62% at 50 meters and 15% at 60 meters.
Figure 15. SPOTR Performance for Phase II: Zone 7
Figure 16. SPOTR Performance for Phase II: Zone 1
Again, the simulated environment is primarily intended to test the functionality of the threat detection software and may not replicate real-world performance. This
experiment did, however, provide us another opportunity to measure initial performance capabilities while incorporating a hardware-in-the-loop processing. During the Phase II experiments we measured the performance of the algorithms in a constrained processing environment prior to moving to Phase III.
4. **Phase III – Discovery Experiments: Field**
*a. Setup*
Phase III experiments were conducted on May 18, 2021 via Zoom to enable screen sharing and communication between AeroVironment engineers in Virginia and NPS students and faculty. This experiment served as our first field testing of a SPOTR-enabled sUAS. We employed a Nibbler sUAS as the surrogate platform while production development continued on our Altavian M440 prototypes. As seen in Figure 18, the Nibbler contained an internal NVIDIA Jetson TX2 microprocessor; however, the object recognition software was conducted on a separate TX2 microprocessor at the ground control station. Thus, similar to Phase II experiments, Phase III testing constrained the processing power to that available on the TX2 microprocessor.

*Figure 17. Phase III: Live Testing Setup*
74 Joe Kehoe, email message to author, May 18, 2021.
The experiment was conducted at the William B. Snyder Boy Scout camp in Haymarket, Virginia. As seen in Figure 19, the camp was divided into three zones to evaluate SPOTR’s performance in varying environments. Zone 1 included a gravel field that produced significant contrast between the targets and the background. Zone 2 introduced more vegetation that included scrub brush, waist-high brush, and fully grown trees. Zone 3 included a single large building, a grass field, and intermittent trees. For this experiment, AeroVironment was only able to provide 3 individuals to serve as genuine entities. The individuals carried fake weapons that simulated a standard M4 rifle while a single pick-up truck was available for use. These tools allowed us to test both the personnel-weapon detection model and the vehicle-personnel detection model.
**Experiment Approach / Setup**

Our assumptions for Phase III were altered since we were able to transition to field testing. Our assumptions for this include:
- Assumption 1: The surrogate platform (Nibbler sUAS) will reasonably replicate the performance capabilities of our Altavian M440 prototypes.
---
75 Joe Kehoe, email message to author, May 18, 2021.
Assumption 2: The field environment at Camp Snyder adequately replicates a representative operational environment for SOF teams.
Our research questions also included:
- Can the Nibbler sUAS equipped with integrated SPOTR software accurately detect and categorize personnel and weapons as potential threats?
- How many entities can be detected and categorized simultaneously in a constrained processing environment?
- At what slant range distance can the software reliably recognize entities?
Due to limitations, we were unable to examine the maximum number of entities that SPOTR is capable of detecting and categorizing during this phase.
b. Execution
Phase III testing was conducted in Zones 1–3 at Camp Snyder. We began in Zone 1 which included a gravel field and 3 personnel targets, 2 of whom were carrying fake weapons. To answer Research Question 1 in Zone 1, the Nibbler was launched and hovered at the optimal slant range distance of 20 meters. We then counted the number of personnel present and compared this to the number of those detected as well as those correctly categorized. The Nibbler was then lowered to an altitude of 10 meters to examine the weapons detection abilities of SPOTR.
To answer Research Question 3 in Zone 1, we incrementally increased the hovering altitude of the Nibbler from 10 meters to 40 meters AGL. The Nibbler was paused at every 5-meter increase in altitude and the number of personnel detected was compared to the number of personnel targets observed. Weapon detection was measured; however, detection was not possible above 15 meters of altitude. After answering our two research questions in Zone 7, the Nibbler and our personnel targets were moved to Zone 2 to repeat the process.
Zone 2 included the same 3 personnel targets and 2 weapon targets but transitioned to a setting that included a grass field, scrub brush, and full-size trees. This setting allowed us to examine the impact of object obscuration on the detection models. Research Question 1 was answered by bringing the Nibbler to a hover at 20 meters altitude to examine the number of personnel targets detected. The Nibbler was then lowered to 10 meters altitude to measure the number of weapons detected.
We then moved to Research Question 3 by adjusting the hovering altitude of the Nibber from 15 meters AGL to 30 meters AGL. The Nibbler was halted every 5-meter increase and the number of personnel targets detected was compared to those observed on the screen. After recording our findings, the Nibbler and our targets were moved to Zone 3 to repeat the process.
Zone 3 included a single-story building, several smaller structures, and sparse trees. The three personnel targets were instructed to move around the structures as we maneuvered the Nibbler, in order to observe the impacts of man-made structures on object detection. Research Question 1 was answered by bringing the Nibbler to a hover at 20 meters altitude to examine the number of personnel targets detected. The Nibbler was then lowered to 10 meters altitude to measure the number of weapons detected.
We then moved to Research Question 3 by adjusting the hovering altitude of the Nibber from 15 meters AGL to 40 meters AGL. The Nibbler was halted at each 5-meter increase and the number of personnel targets detected was compared to those observed on the screen.
c. Findings
In each zone, SPOTR was able to detect and categorize 100% of the observable personnel targets while hovering at the optimal personnel detection altitude of 20 meters. Additionally, SPOTR was able to detect 100% of the weapon targets while operating at the optimal weapon detection altitude of 10 meters. This allowed us to confirm our first research question and determine that SPOTR can accurately detect and categorize personnel and weapons while operating at the optimal slant range distance for detection in a real-world environment.
Figures 20, 21, and 22 summarize our findings for our third research question regarding the maximum slant range that SPOTR can recognize personnel entities. In Zone 1, SPOTR’s personnel and weapon algorithm was able to detect 100% of the personnel entities a slant range of up to 30 meters. At 35 meters, the recognition accuracy of personnel dropped to 66% and 0% at 40 meters. In Zone 2, SPOTR was able to detect 100% of the personnel entities at 20 meters. At 25 meters, SPOTR was able to detect and categorize 66% of the personnel targets but dropped to 0% at 30 meters and beyond. In Zone 3, SPOTR detected 100% of the personnel targets up to 25 meters slant range. Detection and categorization dropped to 66% from 30 meters to 35 meters slant range and dropped again to 33% at 40 meters. Phase III results varied from Phase II as we observed minimal detection absent of categorization. Put differently, SPOTR was able to categorize the vast majority of the entities that it detected; however, was unable to detect entities at greater distances as seen in Phase II.
Figure 19. SPOTR Performance for Phase III: Zone 1
Phase III presented performance disparities between zones. Zones 1 and 3 which we presume is based on background contrast. The gravel field in Zone 1 provided significant contrast between the background and the personnel targets and enabled detection out to 40 meters. Similarly, the grass field and buildings in Zone 3 provided contrast that allowed the targets to stand out from the background. Personnel targets could
obviously not be detected or categorized once they were obscured by buildings and performance was degraded once the personnel were covered by shadows; however, the background contrast did not appear to degrade performance.
We observed the most significant degradation of detection and categorization accuracy in Zone 2. The Nibbler was forced to drop to an altitude of 10 meters AGL to allow weapons to be accurately detected and the accuracy of personnel detection dropped once personnel targets entered the vegetation even when the Nibbler 20 meters from the target. Shadows also negatively impacted SPOTR’s performance in personnel and weapons detection at the 20-meter range. SPOTR could accurately detect and categorize the personnel targets while they were maneuvering in the grass field surrounding the thicker vegetation; however, once they entered the scrub brush or denser vegetation, detection was severely degraded.
The field testing of SPOTR’s detection and categorization supported its capability to detect and categorize personnel and weapons while operating at the optimal slant range distance for each object. Also demonstrated was the ability to detect and categorize entities out to a distance of approximately 40 meters when not obscured by vegetation, buildings, or shadows. The variances in performance, especially in Zone 2, reveals the significant impact that object obscuration can have accurate object detection models. Phase III, however, supported SPOTR’s ability to process live sUAS camera footage and detect trained entities while operating in a constrained, field environment.
THIS PAGE INTENTIONALLY LEFT BLANK
IV. ANALYSIS AND IMPLICATIONS
This section provides an analysis of the experiment results. We examine the results by research question within each phase of testing and compare the results to the technical and operational requirements for SATLAS discussed in Chapter III. Second, we analyze the implications of these results in the context of the SATLAS project and the ability to employ an object recognition-enabled sUAS within SOF teams.
A. ANALYSIS BY PHASE
1. Phase 0
Phase 0 was designed to align perspectives with regards to the simulation software between the NPS student team and advisors and the AeroVironment engineers. The objective was to assess whether it was feasible to use the simulation to evaluate the performance of the SPOTR software on a surrogate drone. Additionally, Phase 0 provided the SATLAS project team with necessary familiarization with SPOTR. Phase 0 also let us refine measurable research questions and measures of performance in order to manage the software development toward a prototype. We identified data that would be necessary to collect in order to establish performance parameters, including 1) accuracy and recall, 2) quantity of entities detected, 3) distance of detection, and 4) altitude of detection. The following section discusses each of these measurements.
a. Accuracy and Recall
Accuracy was our primary requirement for SPOTR as any object recognition software must be able to detect trained entities accurately and reliably to be of use. Accuracy measurements were not recorded during Phase 0 because this was not part of the Phase 0 test plan; however, SPOTR did successfully detect and categorize individuals and vehicles in the synthetic environment. The algorithm for weapon detection was not used during Phase 0, therefore, we were unable to examine this capability. Despite this shortfall, this phase suggested that the simulation could be used to quantitatively measure SPOTR’s accuracy.
b. **Quantity**
We also identified the quantity of entities detected as a possible measurement. This was intended to determine the limitations of the system to better design future tests and assess the feasibility of integrating SPOTR into SATLAS prototypes. We were able to confirm that SPOTR was capable of detecting and categorizing multiple entities simultaneously while operating in the virtual environment.
We did, however, discover that the simulation had internal restrictions regarding the number of entities it could provide. Different zones within the simulation were programmed to provide different target profiles and was limited to 8–10 personnel and one vehicle. This restriction was not easily adjustable and would require significant software engineer support to manipulate. Despite this shortfall, we assessed that the simulation provided a sufficient number of targets to gather initial measurements.
c. **Distance and Altitude**
Other concerns included the distance and altitude at which SPOTR could detect and categorize. Phase 0 showed us that separating lateral distance and altitude to measure the range of SPOTR was not the most accurate method. The simulation provided targets at various lateral distances; therefore, we combined these two research questions to measure the slant range distance between the sUAS and the entity. This allowed for more accurate and reliable measurements in future testing. We identified that SPOTR was able to detect entities at various slant range distances within the simulation. We were also able to manipulate the slant range distance by maneuvering the ArduCopters over the target region which allowed us to measure the slant range distance of detection within the simulation.
Phase 0 enabled us to determine that the simulation provided a sufficient environment to evaluate the SPOTR software. We were able to measure SPOTR’s accuracy, the quantity of entities detected, and the slant range distance of detection to support future experiment phases.
2. **Phase I**
We addressed our three adjusted research questions from Phase 0 in the context of our stated operational requirements. We gathered initial measurements in the synthetic environment and determined the capabilities of the software. Each research question and the analysis and implications are discussed individually in the next section.
**a. Research Question I-1**
Research Question I-1 was designed to determine the ability of SPOTR to accurately detect and categorize vehicles and personnel. This research question considered only accuracy at the optimal slant range distance of 20 meters. Detection and categorization slant range distance were considered in Research Question 3. Additionally, we were unable to test SPOTR at night; therefore, these requirements are omitted from the below table. Table 4 displays the results of Phase I testing compared to the RPUAS and SATLAS technical requirements.
Table 4. Accuracy Requirements and Accuracy Performance: Phase I*
| | RPUAS Data | SATLAS Data | SPOTR Data |
|------------------------|------------|-------------|------------|
| **Detection Accuracy/Slant Range Distance** | -90% PD: | -90%: | -90% PD: |
| | P | Day | P | Day |
| | V | 400m | V | 75m |
| **Categorization Accuracy** | N/A | -90% PC: | -90% PC: |
| | | W | P | Day |
| | | 75m | 50m | Day |
| | | P | V | 100m |
| | | 200m | 75m |
*“P” indicates personnel. “V” indicates a vehicle. “W” indicates a weapon.
As discussed in Chapter II, accuracy is the measure of when the object recognition algorithm guesses how often it is correct, whereas recall is a measure of the how often the algorithm guesses when it should. We measured these two dependent variables and measured the percentage of entities correctly detected and categorized while the sUAS hovered at the optimal slant range distance. We evaluated the accuracy and recall by recording the percentage of correctly detected and categorized entities compared to the number of entities present, including false positives and false negatives. Our findings indicate that, given an optimal slant range distance and relatively unobscured line of sight to an entity, SPOTR should be able to detect and categorize weapons, personnel, and vehicles above the 90% accuracy requirement.
As seen in Table 4, SPOTR met both the detection and categorization requirements for RPUAS and SATLAS defined in Chapter III as it achieved over a 90% detection and categorization accuracy while operating at the optimal slant range distance in the simulation. Constraints of the simulation prevented the sUAS from operating above 60 meters altitude and thus limited the slant range to approximately 75 meters. While this limited our ability to determine the vehicle detection and categorization range, it did allow us to examine the limits of the personnel detection and categorization algorithm.
Phase I enabled us to conclude that the SPOTR software is accurate enough in the simulation mode to warrant further integration into the SATLAS project.
b. Research Question I-2
The goal of Research Question I-2 was to find the maximum quantity of entities SPOTR is capable of simultaneously detecting and categorizing. Phase I allowed us to collect this measurement while the system operated in an unconstrained processing environment. Table 5 displays the results of Research Question 2 during Phase I.
Table 5. Quantity of Entities Detected: Phase I
| | RPUAS Data | SATLAS Data | SPOTR Data |
|----------------------|------------|-------------|------------|
| Quantity of Entities Detected | N/A | 10 | 10 |
The number of entities capable of being detected by SPOTR met the operational requirements of SATLAS. In this phase, the number of entities capable of being detected was limited by the simulation constraints that restricted the number of targets available to 10. This constraint did not allow us to measure the number of entities SPOTR is capable of detecting; however, we were able to observe it detecting all 10 entities at one time. The number of entities capable of being categorized was limited to 8 by a software constraint designed to maintain a higher frame rate for the algorithms. SPOTR was able to reach this maximum limitation of 8 simultaneous categorizations.
Research Question I-2 helped us to conclude that SPOTR should be able to simultaneously detect a sufficient number of entities while operating in an unconstrained and simulated environment.
c. Research Question I-3
Our third research question concerned the maximum slant range distance at which SPOTR could detect and categorize entities. As illustrated in Table 4, SPOTR did not meet the distance requirements for detection for RPUAS or SATLAS and did not meet the distance requirements for categorization for SATLAS. Detection of personnel-sized targets dropped significantly at slant range distances of greater than 60 meters while categorization began to drop when greater than 50 meters. Of note, however, the simulation replicated the wide-angle camera setting of a GoPro Hero 4. Additionally, SPOTR uses real-world training data and simulation performance is not exact to real-world performance.
Two potential explanations for SPOTR’s performance are the differences between real-world training data and what the simulation can replicate as well as the wide-angle camera replicated in the simulation. As previously mentioned, the synthetic environment
is generally designed to validate the performance of the detection algorithms before moving into live tests. Live training data will perform differently in the virtual setting. Additionally, as mentioned in Chapter II, camera capabilities and pixel size are important factors of object recognition results. The wide-angle cameras replicated did not provide the desired results in the simulated environment. Thus, prototypes will likely need to employ both wide and narrow field of view cameras to reach the technical requirements for both RPUAS and SATLAS. Software improvements, such as super-resolution, may also be required to allow object detection at the required ranges.
3. Phase II
Phase II testing was designed to test our research questions in the same synthetic environment while integrating a hardware-in-the-loop design to constrain processing capabilities to that of onboard future prototypes. We approached this phase with the same three research questions, gather additional measurements in the simulated environment, and determine the feasibility of on-the-edge processing for object recognition. Each research question and the analysis of the findings are discussed individually in the next section.
a. Research Question II-1
Research Question II-1 remained the ability of SPOTR to accurately detect and categorize personnel and weapons. The loaded algorithms for Phase II included personnel and weapon detection but not vehicle detection; thus, vehicle detection was not measured. Additionally, we were unable to test SPOTR at night; therefore, this requirement is omitted from the below table. Table 6 displays the results of Phase II testing compared to the RPUAS and SATLAS technical requirements as well as the results of SPOTR testing in Phase I.
Table 6. Accuracy Requirements and Accuracy Performance: Phase II*
| | RPUAS Data | SATLAS Data | SPOTR Data: Phase I | SPOTR Data: Phase II |
|----------------------|------------|-------------|---------------------|----------------------|
| **Detection Accuracy/Slant Range Distance** | -90% PD: | -90% PD: | -90% PD: | -Zone 7: 90% PD: |
| | P | W | P | |
| | 300m | 200m | 60m | |
| | | | | |
| | V | | V | |
| | 400m | | 75m | |
| **Categorization Accuracy** | N/A | -90% PC: | -90% PC | -Zone 7: 90% PC: |
| | | W | P | |
| | | 75m | 50m | |
| | | | | |
| | | P | V | |
| | | 100m | 75m | |
| | | | | |
| | | V | | |
| | | 200m | | |
*“P” indicates personnel. “W” indicates a weapon. “V” indicated a vehicle.
SPOTR met the detection and categorization accuracy requirements for RPUAS and SATLAS as defined in Chapter III and maintained over 90% accuracy when operating at its optimal slant range distance. Interestingly, the constrained processing environment appeared to negatively impact object detection and categorization performance. Of additional interest was the performance disparity between zones during Phase II. SPOTR performance in Zone 1, while degraded from Phase I testing, was significantly better than its performance in Zone 7. Zone 1 contained a much darker background than Zone 7 which
allowed the targets to standout. This finding suggests that SPOTR performance improves with increased contrast while operating in a simulated environment. While personnel detection and categorization accuracy met the requirements of RPUAS and SATLAS, Phase II demonstrated that accuracy may be negatively impacted by limited processing power and the lack of contrast between entities and the observed background. This may necessitate considerations for Pillar 1 platform modifications.
b. Research Question II-2
Research Question II-2 sought to find the maximum number of entities SPOTR is capable of simultaneously detecting and categorizing. Software engineers were able to slightly increase the number of targets to 13 in different zones to further stress SPOTR while operating in a constrained processing environment. Table 7 displays the results of Research Question 2 during Phase II as compared to the RPUAS and SATLAS requirements as well as Phase I.
Table 7. Quantity of Entities Detected: Phase II
| | RPUAS Data | SATLAS Data | SPOTR Phase I | SPOTR Phase II |
|------------------------|------------|-------------|---------------|----------------|
| Number of Entities Detected | N/A | 10 | 10 | Zone 7: 13 |
| | | | | Zone 1: 6 |
The quantity of entities detected by SPOTR met the technical requirements of SATLAS while this phase also demonstrated that detection rate was not negatively impacted by reduced processing power. The number of entities capable of being detected was limited to 13 in Zone 7 and 6 in Zone 1 and SPOTR was able to detect all available targets while operating at an optimal slant range distance of 20 meters. The number of entities capable of being categorized remained limited to 8 by the internal software constraints. SPOTR was able to reach this maximum limitation of 8 simultaneous categorizations while during this phase. From Phase II, we concluded that SPOTR is able
to simultaneously detect an adequate number of entities while operating on limited processing power and in simulated environment.
c. Research Question II-3
The third research question regarded the maximum slant range distance at which SPOTR could detect and categorize entities. As seen in Table 6, SPOTR performance did not meet the distance requirements for detection for RPUAS or SATLAS and did not meet the distance requirements for categorization for SATLAS.
Phase II findings demonstrated a reduction in range for SPOTR while performing with reduced processing power. The distances at which SPOTR could detect and categorize entities was cut nearly in half between Phase I and Phase II. Phase II also demonstrated a clear impact on detection and categorization performance in different zones. The only observable difference between the two zones tested was that the backdrop in Zone 7 appeared much darker and had an increased number of shadows from the buildings. Given that the maximum distance for detection and categorization in Zone 1 was nearly double that in Zone 7, this may indicate that the size of an entity is as important as background contrast in a simulated environment.
Phase II suggested that increased processing power will be needed to improve SPOTR’s detection range. The SATLAS project may need to seek alternatives to the NVIDIA TX2 that provide increased processing power. Additionally, this phase suggested that cameras that are able to emphasize contrast between entities and the background (e.g., EO/IR) may also improve detection range and may be valuable avenues of future research.
4. Phase III
Phase III testing was our first opportunity to evaluate our research questions using a sUAS with integrated SPOTR in a field environment. Similar to Phase II, processing power was limited to that available on a NVIDIA TX2 microprocessor. We intended to evaluate our same three research questions; however, limited role players did not allow us to measure the maximum quantity of entities SPOTR could detect and categorize in a live environment. Phase III used a surrogate sUAS (Nibbler) to gather initial measurements in
a field setting to determine the feasibility of on-the-edge processing for object recognition. Each research question and the analysis of our findings are discussed in the next sections.
**a. Research Question III-1**
Research Question III-1 was the ability of SPOTR to accurately detect and categorize personnel and weapons. Engineers were able to transition between the personnel and weapon detection model and the vehicle and personnel detection model; however, testing primarily focused on the former. Table 8 displays the results of Phase III testing for each zone compared to the RPUAS and SATLAS technical requirements as well as the results of SPOTR testing in Phase I and Phase II.
Table 8. Accuracy Requirements and Accuracy Performance: Phase III*
| | RPUAS Data | SATLAS Data | SPOTR Data: Phase I | SPOTR Data: Phase II | SPOTR Data: Phase III |
|----------------------|------------|-------------|---------------------|---------------------|-----------------------|
| Detection Accuracy/ | -90% PD: | -90% PD: | -90% PD: | -Zone 7: 90% PD: | -Zone 1: 90% PD: |
| Slant Range Distance | | | | | |
| | P | W | P | W | W |
| | 300m | 200m | 60m | 0m | 15m |
| | V | P | V | P | P |
| | 200m | 300m | 75m | 20m | 30m |
*Note: The table is formatted with columns for different data sets and rows for different parameters. The data includes detection accuracy percentages, slant range distances, and specific zones (Zone 7, Zone 1, Zone 2, Zone 3) with their respective performance metrics.
Field testing of SPOTR met the detection and categorization accuracy requirements for RPUAS and SATLAS as defined in Chapter III at the optimal slant range distance. Phase III demonstrated less disparity between the distance at which entities are detected versus the distance at which they are categorized. Essentially, once SPOTR was able to detect an object, it could categorize it at the same distance so long as the software was trained for the specific object. This phase also revealed very similar performance outcomes as those observed in the constrained processing environment during Phase II.
This finding reveals the impact of object obscuration on object recognition models while also demonstrating some current limitations of employing these systems in wooded operational environments. While personnel detection and categorization accuracy met the requirements of RPUAS or SATLAS at the optimal slant range distance, Phase III
demonstrated the impact of obscuration on object detection accuracy and emphasized the need for improved camera systems to increase detection in varying environments.
b. **Research Question III-2**
Phase III did not measure the maximum number of entities SPOTR was capable of simultaneously detecting and categorizing as the experiment was limited to the three personnel and two weapons. The testing did reveal that at the optimal slant range distance, SPOTR could simultaneously detect the three personnel and two weapons; however, further testing will need to be conducted to determine the true limits of the system.
c. **Research Question III-3**
Our third research question considered the maximum slant range distance at which SPOTR could detect and categorize entities. As seen in Table 8, SPOTR did not meet the distance requirements for detection for RPUAS or SATLAS and did not meet the distance requirements for categorization for SATLAS.
The findings from Phase III revealed similar performance metrics to Phase II which suggests that the constrained processing power will reduce the slant range at which entities can be detected and categorized. Live testing also demonstrated SPOTR’s ability to categorize at the same distance it could detect entities. In open areas, SPOTR could accurately detect and categorize personnel out to approximately 40 meters. The shadows and vegetation present in Zone 2 cut this range down to approximately 25 meters and demonstrated the severe impacts of object obscuration on object recognition.
Despite the inadequate slant range distance, there are various options to increase the range of detection for SPOTR or other object recognition models. As discussed in Chapter II, pixel size is dependent on the camera system. Adjusting the available payload in favor of dual-camera systems with wide-angle cameras and narrow-angle cameras is one possible solution. As seen in Figure 23, narrow-angle cameras with available zoom options will increase the available pixel size and increase the slant range for detection and categorization. A second alternative is the super resolution algorithm discussed by Borel
Processing camera feed in a super resolution algorithm also increases the available pixel size for object detection but without impacting the onboard hardware. Both techniques offer options to increase pixel size and improve detection range and performance in vegetation.
**Vertical Target Resolution by Relative Position: SRR Altavian M440 (Narrow)**

*Figure 22. SPOTR Detection Range: Narrow-Camera*
**B. OPERATIONAL IMPLICATIONS**
This section provides an analysis of our three primary measurements: accuracy and recall, multiple target detection, and slant range. We consider the performance metrics achieved, the desired metrics, and the implications these will have for an SFOD-A in an operational context.
---
76 Christoph Borel and S. Young, “Image Quality and Super Resolution Effects on Object Recognition Using Deep Neural Networks,” 7–8.
77 Joe Kehoe, email message to author, May 7, 2021.
We approach this analysis with three primary assumptions: 1) that MDO will reflect the predominant operating environment of the future for SOF teams and that scenarios resembling our vignette in Chapter II, isolated and small teams requiring organic ISR support, will become increasingly common, 2) that MDO will limit the degree to which SOF teams will be able to rely on large, theater-level ISR platforms, and 3) operators will need to maneuver platforms within close proximity of potential targets for positive identification prior to taking lethal or non-lethal action. The following sections discuss our three categories with these in mind.
1. **Accuracy and Recall**
The implications of such a high degree of accuracy and recall are significant for SATLAS and SOF teams. The ability of an organic platform to accurately detect and categorize trained entities provides a unique situational awareness to a SOF team. Access to such a system will enable SOF teams to surveil areas of interest in their immediate proximity and detect and categorize moving entities in order to positively identify them. In the vignette, the ISIS militants maneuvered undetected within 75 meters of isolated SOF teams, ambushed, and killed U.S. Soldiers. Because the situational awareness of these SOF teams was degraded, small elements of enemy combatants maneuvered through the restrictive terrain and urban areas while taking advantage of security gaps. Operating in a MDO environment will only increase the impacts of diminished situational awareness on small and isolated SOF teams. Politically sensitive environments, reduced air superiority, and the use of clandestine techniques will exacerbate situational awareness shortfalls.\(^{78}\) Object recognition-capable sUAS with a 90% accuracy would present a method to increase situational awareness for SOF teams in future MDO environments.
2. **Quantity**
SPOTR was able to simultaneously detect and categorize enough entities in the simulation to suggest its potential value for SOF teams. To achieve this goal, SPOTR does not need to be able to detect and categorize every trained entity in a given environment.
\(^{78}\) Department of the Army, *Army Futures Command Concept for Special Operations 2028*, 12–25.
Instead, the detection and categorization of 10 trained entities could provide sufficient warning to a SOF team while avoiding cognitive overload. In the vignette in Chapter II, it was uncommon to encounter enemy combatants maneuvering in groups that included more than 10 personnel. While this will vary depending on the tactical environment, a human-in-the-loop system that alerts the operator to detections and enables the user to assess the entity as a threat or not provides the most value. Requiring SPOTR to simultaneously detect and categorize more than 10 entities would not improve its operational value and risks overwhelming the user with alerts in this specific context.
Perhaps more important than the accurate detection and categorization rate is the ability to toggle between the different detection modes and tailor the alerts based on the situation. While not an initial research question nor a measurement collected, the Phase III experiment suggested the importance of being able to easily adjust detection modes between personnel/weapon and vehicle/personnel models. This capability would allow SOF teams to collect the desirable information based on the operational environment while avoiding unnecessary detections and categorizations. For example, vehicle detection would have proved useless in the vignette in Chapter II due to the rugged terrain and inaccessible routes and the personnel/weapon detection model would have been most useful. This requirement will likely change based on the scenario in which SOF teams find themselves. The ability to tailor the specific detection model to the environment will reduce unnecessary information overload on SOF teams and allow them to collect only the needed information.
Another factor that deserves future attention is the ability to adjust the sensitivity of SPOTR based on the tactical environment. This consideration was beyond our scope; however, we were able to adjust the detection sensitivity during the Phase I experiment to reduce the number of false positives or false negatives. Depending on the operational environment, SOF teams may prefer to select a setting that makes only correct detections but may miss some detections or makes detections at every available opportunity and results in some inaccurate detections or is somewhere in the middle. This would enable the operator to tailor the number of detections received along with the accuracy requirement and control the cognitive burden of the system.
3. **Slant Range**
SPOTR did not meet the slant range distance requirements of RPUAS or SATLAS and should be the focus of future experiments or software adjustments. The current RPUAS and SATLAS requirements call for a system capable of detecting a weapon at 200 meters, personnel at 300 meters, and a vehicle at 400 meters during the day. Our simulated and live experiments incorporated a camera with resolution equivalent to a wide-angle GoPro Hero 4. Wide-angle cameras perform well to scan large areas; however, the lack of a narrow-angle camera with zoom capabilities required the sUAS to get within extremely close proximity to the entities to enable detection and categorization. However, this does not mitigate the inadequate slant range detection capabilities. In an operational setting, placing a platform within 60 meters of a vehicle, 40 meters of a person, or 15 meters from a weapon incur unacceptable risk to forces and would alert the targets that they are being observed.
However, we assess that the hardware and software solutions available to improve the slant range distance of detection for SPOTR also introduce technical implications worth noting. Improved camera systems could increase the payload weight of the sUAS which may impact the flight mechanics of the sUAS and the battery load. An increased battery load will deplete batteries quicker and could require solar panels, hand cranks, or generators to recharge the batteries. Adding super-resolution algorithms could increase the processing load of the microprocessor and limit the processing power available for SPOTR. These technical implications warrant further research into if and to what degree they may impact the current sUAS requirements and potentially reconsideration of the SATLAS Pillar 1.
There are potential operational implications that could affect SOF teams. Increasing battery load could decrease sUAS loiter time and reduce ISR coverage time for SOF teams. SOF teams could then be required to carry additional batteries to account for reduced loiter times which would increase their truckload requirement. Better resolution often requires increasingly narrow fields of view and zoom capabilities. While this improves detection accuracy and range, it could limit the team’s overall situational awareness. Additionally, larger camera payloads may increase the overall size of the sUAS and impact the ability of SOF team members to easily transport the system in a rucksack.
V. CONCLUSION
The purpose of this research was to manage the development and integration of SPOTR object recognition software into a sUAS and evaluate its performance. Our objective was to advance the SATLAS project Pillar 2, integrating object recognition capability into the sUAS with a focus on technical performance and operational implications. We used simulations and field experimentation to measure the capabilities of SPOTR software, determine whether it meets SATLAS and RPUAS requirements, and identify capability shortfalls to the developer.
We collaborated with an industry leading software company to conduct a series of experiments to measure the technical requirements for accuracy, number of entities capable of detection, and range of detection. Although we experienced challenges with integration timelines and testing constraints, we were able to use a simulated environment and a surrogate platform that proved sufficient in answering our research questions. We assess that at its current stage of development, the SPOTR software can achieve the SATLAS technical requirements for accuracy and for the quantity of entities detected. SPOTR does not currently achieve the technical requirements for slant range distance of detection for SATLAS.
We assess that, while additional software design and integration remain, SPOTR has the potential to significantly improve situational awareness for SOF teams. We advanced Pillar 2 of the SATLAS project by employing a sUAS that is being used by U.S. forces. The accuracy and number of entities SPOTR can detect present opportunities to increase situational awareness and survivability of deployed SOF teams. Also, we identified the slant range distance shortfall and methods for improvement that subsequent student teams can improve upon to further the overall objective of SATLAS. Overall, we provided a theory analysis and method that helps to evident SATLAS-type systems.
A. SUMMARY
Our conclusions are organized by technical findings, operational requirements, and integration process.
1. **Technical Implications**
We assess that SPOTR can detect at over 90% accuracy and categorize entities in a simulated environment and temperate field environment while operating at the optimal slant range distance of 20 meters. We found that SPOTR was able to detect up to 13 entities and categorize eight when operating with limited processing power equivalent to that which is aboard the test drone. We also discovered that within the confines of our experiments and with the available camera, SPOTR was only able to detect entities out to approximately 40–45 meters slant range distance. Currently, SPOTR meets the technical requirements of SATLAS with respect to the accuracy and number of entities detected; however, it does not meet these requirements at the required range. There are hardware and software options to improve this capability, but they may introduce implications for the platform.
SPOTR’s performance is dependent on pixel size and processing power to ensure accurate detection. Integrating a more capable and narrow view camera payload may be an approach to improve detection range yet this may increase the weight and battery load. Additionally, super-resolution algorithms offer another avenue to improve detection range, but this may require additional processing power and limit that available to SPOTR.
2. **Operational Implications**
The demand for SOF teams to employ small, organic sUAS in future operational environments will likely increase in the future. As risk to force and risk to mission factors increase in these scenarios, object recognition-enabled sUAS can be one tool to increase situational awareness and mitigate risk. We have assessed that accurate object recognition software maybe capable of simultaneously detecting the required number of entities aboard sUAS within the context of our experiment.
The current inability of SPOTR to achieve the range of detection required by SATLAS has important operational implications. In order for SPOTR to be useful to an SFOD-A, its detection range must increase. Increased payload weight can decrease loiter time and require SOF teams to carry additional batteries to compensate while narrow field of view cameras can reduce overall situational awareness.
By defining the SATLAS technical requirements and evaluating the accuracy and number of entities capable of being detected, our study advances the SATLAS project. This research serves as an additional step towards integrating object recognition and sUAS that can improve the situational awareness and survivability of SOF teams. Our operational requirements are based on our operational experience and informed by Army requirements and MDO doctrine.
3. Integration Process
While managing SPOTR integration, we simultaneously tested SPOTR capabilities for further SATLAS research. We were unable to complete Pillar 2 analysis due to the complex nature of integrating systems from two different commercial industries. To mitigate the impact of delayed development, we employed simulations to measure object recognition performance. We propose that SPOTR performance in the simulated environment was comparable to real-world performance when camera settings were adjusted accordingly. This should provide an avenue for future SPOTR testing without being dependent on resolving commercial industry requirements to collaborate between competitors. Since the SATLAS prototype design currently in development incorporates a more capable camera than the Nibbler, adjusting the camera test specifications will enable future studies to accurately measure performance. The ability to integrate NPS student projects and commercial industry to develop solutions to real-world problems does present significant opportunities for SATLAS to achieve our primary objective.
B. LIMITATIONS
This thesis was limited in several ways. We intentionally limited its scope to Pillar 2 of the SATLAS project while leaving Pillars 3 and 4 for future studies. An 18-month academic research cycle and prototype development delays did not allow us to test our intended prototype. Instead, we relied on simulations and a surrogate platform to examine the SPOTR software. The reader should keep these limitations in mind when considering our conclusions and recommendations.
C. FUTURE WORK
This section provides recommendations for future work to develop an organic, object recognition-enabled sUAS for SOF teams. Our study focused on SPOTR’s detection and categorization performance in a simulated environment and onboard a surrogate platform. We recommend that future work focus on SPOTR’s capability onboard the SATLAS Altavian M440. Given the dependence of object recognition software on the available camera, we expect the M440s to perform better than the Nibbler.
Future work that is immediately pursuable is adjusting the simulation camera settings to replicate the more capable camera onboard the M440. We believe this would facilitate measuring the comparable accuracy and range of the desired prototype. Future efforts will rely on continued management of the integration onto the M440 in collaboration with AeroVironment. Employing the simulation as a testing environment will allow initial measurements to be gathered while integration efforts continue.
Additionally, we recommend that future studies examine the use of super resolution algorithms as a software technique to increase detection range. We found detection range to be the only shortcoming of the SPOTR software. Employing a more capable camera will undoubtedly increase detection range but it still may not meet the specifications required for SOF teams.
Finally, we recommend that planning begins to integrate Pillars 3 and 4 into testing. Autonodyne is a California-based company that has begun development on a sUAS common control station that integrates several autonomous features. Given that the overall goal of SATLAS is to integrate all four pillars into one complete system, Autonodyne may offer opportunities for collaboration on the final two pillars.
Alberts, David and Hayes, Richard, *Code of Best Practice for Experimentation*, CCRP Publication Series (Washington, DC: DOD Command and Control Research Program, 2002). http://dodccrp.org/files/Alberts_Experimentation.pdf
Borel, Christoph and Young, S. “Image Quality and Super Resolution Effects on Object Recognition Using Deep Neural Networks,” in 2019 SPIE Conference for Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications. (SPIE, 2019), https://doi.org/10.1117/12.2518524
Collins, Liam and Morgan, Harrison “Affordable, Abundant, and Autonomous: The Future of Ground Warfare,” *War on the Rocks* (April 21, 2020): https://warontherocks.com/2020/04/affordable-abundant-and-autonomous-the-future-of-ground-warfare/.
Conley, Heather et al., *The Kremlin Playbook: Understanding Russian Influence in Central and Eastern Europe*, (Washington, DC: Center for Strategic and International Studies, 2016), https://www.csis.org/analysis/kremlin-playbook.
Clausewitz, Carl V. *On War*, Translated by Michael Howard and Peter Paret, (Princeton University Press, 1976), Book 1, Chapter 7.
Daniel Midgett, email message to author, September 4, 2020.
Defense Advanced Research Projects Agency, *With Squad X, Dismounted Units Partner with AI to Dominate Battlespace*, (Washington, DC: Defense Advanced Research Projects Agency, 2019), . https://www.darpa.mil/news-events/2019-07-12
Department of Defense, *Broad Agency Announcement For Technology Development and Advanced Technology Development* (Washington, DC: Department of Defense, 2020).
Department of Defense, “Capability Production Document For Rucksack Portable Unmanned Aircraft System (RPUAS) Increment 2,” (Washington, DC; Department of Defense, 2013).
Department of Defense, *Defense Innovation Unit Announces sUAS Product Availability to Provide Secure, Capable Small Unmanned Aerial Systems for Critical Uses Across the Government*, Washington, DC: Department of Defense, 2020. https://www.defense.gov/Newsroom/Releases/Release/Article/2318799/defense-innovation-unit-announces-suas-product-availability-to-provide-secure-c/
Department of Defense, *Eyes of the Army: U.S. Army Roadmap for UAS 2010–2035*, (Washington, DC: Department of Defense, 2010). https://fas.org/irp/program/collect/uas-army.pdf
Department of Defense, *RQ-11B Raven Small Unmanned Aircraft System (SUAS)*, (Washington, DC: Department of Defense, 2016), https://asc.army.mil/web/portfolio-item/aviation_raven-suas/
Department of Defense, *Summary of the 2018 National Defense Strategy of the United States of America*. Washington, DC: Department of Defense 2018. National Defense Strategy, Department of Defense, 2018. https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf
Department of the Army, *Army Futures Command Concept for Special Operations 2028*, Army Futures Command Pamphlet 71–20-4; (Washington, DC: Department of the Army, 2020), https://api.army.mil/e2/c/downloads/2021/01/05/bdd61e44/20200918-afc-pam-71-20-4-afc-concept-for-special-operations-2028-final.pdf
Department of the Army, *Army Special Operations*, ADP 3–05 (Washington, DC: Department of the Army, 2019), https://armypubs.army.mil/epubs/DR_pubs/DR_a/pdf/web/ARN18909_ADP%203-05%20C1%20FINAL%20WEB(2).pdf
Department of the Army, *The U.S. Army in Multi-Domain Operations 2028*, U.S. Army TRADOC Pamphlet 525-3-1 (Washington, DC: Department of the Army, 2018), December 6, 2018, https://api.army.mil/e2/c/downloads/2021/02/26/b45372c1/20181206-tp525-3-1-the-us-army-in-mdo-2028-final.pdf
Eckstein, Megan “Marines’ 3D-Printed ‘Nibbler’ Drone Creating Lessons Learned on Logistics, Counter-UAS,” *USNI News*, (September 2017), https://news.usni.org/2017/09/27/marines-3d-printed-nibbler-drone-creating-lessons-learned-logistics-counter-uas.
Eidson, Bill “Nibbler Drone Is an Advanced Manufacturing ‘Flagship’ for Marines,” *MITRE*, (January 2019), https://www.mitre.org/publications/project-stories/nibbler-drone-is-an-advanced-manufacturing-flagship-for-marines.
Everingham, Mark et al., “The Pascal Visual Object Classes Challenge: A Retrospective,” *International Journal of Computer Vision* 111, no. 1 (January 1, 2015): 98–136, https://doi.org/10.1007/s11263-014-0733-5.
Fraga-Lamas, Paula et. al., “A Review on IoT Deep Learning UAV Systems for Autonomous Obstacle Detection and Collision Avoidance,” *Remote Sensing* 11, no. 18 (January 2019): 2144, https://doi.org/10.3390/rs11182144.
Friend, Alice *DOD’s Report on the Investigation into the 2017 Ambush in Niger*, (Washington, DC: Center for Strategic and International Studies, 2018), https://www.csis.org/analysis/dods-report-investigation-2017-ambush-niger.
Garamone, Jim “Milley Makes Case for U.S. Military Keeping Up With Global, Technology Changes,” U.S. Department of Defense, (December 2, 2020): https://www.defense.gov/Explore/News/Article/Article/2432855/milley-makes-case-for-us-military-keeping-up-with-global-technology-changes/.
GoPro, *GoPro Hero 4 Silver User Manual*, 2014, https://gopro.com/content/dam/help/hero4-silver/manuals/UM_H4Silver_ENG_REVA_WEB.pdf
Hambling, David “U.S. To Equip MQ-9 Reaper Drones with Artificial Intelligence,” *Forbes*, (December 2020), https://www.forbes.com/sites/davidhambling/2020/12/11/new-project-will-give-us-mq-9-reaper-drones-artificial-intelligence/?sh=37723b3c7a8e.
Kofman, Michael et al., *Lessons from Russia’s Operations in Crimea and Eastern Ukraine*, RR 1498 (Santa Monica, CA: RAND, 2017), https://www.rand.org/pubs/research_reports/RR1498.html
LeCun, Yann et al., “Deep Learning,” *Nature*, no. 7553 (May 2015): 436–44, https://doi.org/10.1038/nature14539.
Li Liu et al., “Deep Learning for Generic Object Detection: A Survey,” *International Journal of Computer Vision* 128, no. 2 (February 2020): 261–318, https://doi.org/10.1007/s11263-019-01247-4.
McArdle, Jennifer “Simulating War: Three Enduring Lessons from the Louisiana Maneuvers,” *War on the Rocks* (March 2021), https://warontherocks.com/2021/03/simulating-war-three-enduring-lessons-from-the-louisiana-maneuvers/.
Mohey El-Din, Doaa et. al. “An Automatic Detection of Military Objects and Terrorism Classification System Based on Deep Transfer Learning,” in *Proceedings of the International Conference on Artificial Intelligence and Computer Vision (AICV2020)*, ed. Aboul-Ella Hassanien et al., Advances in Intelligent Systems and Computing (Cham: Springer International Publishing, 2020), 594–603, https://doi.org/10.1007/978-3-030-44289-7_56.
Midgett, Daniel et. al., “Semiautonomous Threat Learning Alert System,” (master’s thesis, Naval Postgraduate School, 2020), 46–52, December 2020.
Miller, Jack “Strategic Significance of Drone Operations for Warfare,” *E-International Relations*, (August 2013), https://www.e-ir.info/2013/08/19/strategic-significance-of-drone-operations-for-warfare/.
Office of the Director of National Intelligence, *Annual Threat Assessment of the U.S. Intelligence Community*, (Washington, DC: Office of the Director of National Intelligence, 2021), https://www.dni.gov/files/ODNI/documents/assessments/ATA-2021-Unclassified-Report.pdf
Seffers, George “Army Tactical Assault Kit Always Adapting for New Era,” *Signal*, October 28, 2020. www.afcea.org/content/army-tactical-assault-kit-always-adapting-new-era
Statnikov, R. et. al., “Multicriteria Analysis Tools in Real-Life Problems,” *Computers & Mathematics with Applications* 52 (2006) 1–32. https://doi.org/10.1016/j.camwa.2006.08.002
Sterio, Milena “The United States’ Use of Drones in the War on Terror: The Legality of Targeted Killings under International Law,” *Case Western Reserve Journal of International Law* 45 (2012) https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1072&context=jil.
Suchman, Lucy “Algorithmic Warfare and the Reinvention of Accuracy,” *Critical Studies on Security* 8, no. 2 (May 3, 2020): 175–87, https://doi.org/10.1080/21624887.2020.1760587.
Yang, Zhi et al., “Deep Transfer Learning for Military Object Recognition under Small Training Set Condition,” *Neural Computing and Applications*, no. 10 (October 1, 2019): 6469–78, https://doi.org/10.1007/s00521-018-3468-3.
INITIAL DISTRIBUTION LIST
1. Defense Technical Information Center
Ft. Belvoir, Virginia
2. Dudley Knox Library
Naval Postgraduate School
Monterey, California
|
16b50392-36a9-400d-ac0b-44c0d6271fee
|
CC-MAIN-2024-51
|
https://apps.dtic.mil/sti/pdfs/AD1150898.pdf
|
2024-12-13T14:53:34+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-51/subset=warc/part-00257-b392068a-8e35-4497-8fab-a691b1a71843.c000.gz.parquet
| 79,767,884
| 34,662
|
eng_Latn
|
eng_Latn
| 0.936927
|
eng_Latn
| 0.974966
|
[
"eng_Latn",
"unknown",
"eng_Latn",
"unknown",
"eng_Latn",
"unknown",
"eng_Latn",
"unknown",
"por_Latn",
"por_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
231,
267,
4756,
4792,
5256,
5292,
6567,
6603,
10461,
11821,
14127,
14163,
15115,
15151,
16513,
16549,
17659,
17695,
20217,
22632,
25453,
27441,
28686,
28722,
31001,
33494,
35969,
38720,
41300,
44204,
46930,
49504,
52204,
55171,
56872,
59145,
60772,
63413,
65519,
66077,
68338,
69559,
71807,
73275,
75161,
76499,
78797,
80608,
82984,
85023,
88018,
90290,
92382,
94685,
96382,
96947,
98137,
99467,
100701,
102413,
103872,
105769,
107003,
107636,
108502,
109721,
111864,
112222,
113478,
114731,
116468,
118642,
119766,
120188,
121800,
121836,
123790,
125809,
127641,
129572,
131664,
133439,
135815,
137853,
140011,
142007,
142948,
145107,
146079,
148341,
150837,
153312,
155370,
157625,
159672,
161441,
163566,
166156,
168603,
169644,
169814
] |
M.R. James,Descriptive Catalogue of the Manuscripts in the Library of Corpus Christi College
MS286
Gospels of St Augustine
Evangelia Cantuariensia
Codicology: Vellum, mm 245 x 190, (9.5 x 7.5 in.), ff. 2 + 265 + 6, double columns of 25 lines to a page. Assigned to the vith cent. by Tischendorf [] (note by him on last flyleaf (f. vr)) on account of its marked likeness to Codex Amiatinus [BMLAM1] ; to the vith cent. also by Traube [] (note in catalogue); to the viith cent. by more recent writers. In fine uncials on lines ruled with the dry point; words not divided. Beginnings of clauses are thrown out; the rest of the clause indented. First words of chapters in red. Sections (EusebianAmmonian) and headlines (occasional) in smaller hand. Each gospel is said to be in a distinct hand.
2
Collation: a 2 , gap, iii 2 iv 8 -xii 8 xiii 10 (wants 1 or 4) xiv 8 -xviii 8 (+ 8*) xix 8 (wants 1, 8) xx 8 -xxviii 8 xxix 4 (wants 4) xxx 8 -xxxvi 8 xxxvii 4 , b 2 c d 2 .
Provenance: Most critics agree in thinking that it was written in Italy [] . From St Augustine's, Canterbury [] (see charters at end). [James 1903] []
<< Ancient Libraries , pp. lxvii, lxviii . It is probably, but not certainly, mentioned by Thomas of Elmham .>>
Quires iv-xii have on their last page near the inner corner Q. IIII etc. in a hand at least near the time of the original. Most of the others have had a number written in cent. xiv on their first page. This has been erased in a majority of cases.
The vellum is of very unequal quality. The ink has disappeared in a good many places from the thinner sheets.
f. ir blank except for a slight green stain caused perhaps by metal. f. iir has a small rust mark at top. On f. iiv is a bearded head cleverly sketched by an English hand of cent. x, xi?
Research: This manuscript was Bentley's B [Bentley ???] , Westcott's 23 (Dict. Bibl. article Vulgate) [Smith 1860-63] . In the Novum Testamentum Latine of Wordsworth and White it is X [Wordsworth and White 1899] . It was collated for this edition by Dr A. W. Streane [] . It is no. 20 in Gregory's Prolegomena, p. 995 [Gregory 1894] .
Research: The principal reproductions are in: Westwood, Anglo-Saxon and Irish MSS., pp. 49, 50 [Westwood 1868] . Westwood, Palaeographia Sacra Pictoria, pl. ii [Westwood 1843-5a] . Goodwin, Cambridge Antiquarian Society [Goodwin 1847] . Alphabets, etc., 3 pages of text, painting I, and small scenes from painting II. In colours. Palaeographical Society I, pl. 33, 34, 44 [Bond and Thompson 1873-78] . Cambridge Antiquarian Society Proceedings Vol. II, pl. ix, painting II [CAS ???] . In colours. Garrucci, Storia del' arte Cristiana III [Garrucci 1873-81] .
Research: Mr H. J. White [] (Article Vulgate in Hastings' Dict. Bib. IV 887 [Hastings and Selbie 1898-1904] ) says of this MS. (according to tradition sent by Pope Gregory [] to Augustine [] ) "the text does not bear out this supposition, it closely resembles that of the preceding MS. (Bodl. Auct. D. 2. 14 [OBL698] ) and is really Anglo-Saxon, though it has been corrected throughout in accordance with a MS. of the Amiatinus type." In spite of this complexion of the text it must be remembered that a large consensus of critics assign to the writing and paintings an Italian origin. It is of course possible that like the Codex Amiatinus [BMLAM1] this book may have been written by an Italian resident in England.
Research: The latest discussion of the MS. which I have seen is that by Dom J. Chapman, Early History of the Vulgate Gospels (1908) 183 sqq. [Chapman 1908] , who disagrees with Mr White's conclusions. His final statement (p. 189) is: "The two noble volumes of Gospels [i.e. this MS. and the Bodleian Gospels, Auct. D. 2. 14 [OBL698] ] are old enough to be what they were believed to be; and I do not think the internal evidence of their readings can be shown to make this impossible."
Research: Traube (Nomina Sacra, p. 189, note 3 [Traube 1907] ) says: "Es hatten dns die alten Handschriften, die aus Rom [] und Süditalien nach England [] durch Augustin [] und seine Nachfolger kamen, Handschriften, von denen wir selbst noch besitzen z. B. den Bonifatianus I [] in Fulda [] , die Evangelia S. Augustini [] Cambridge C. C. C. 286 und Würzburg Theol. Q. 2 [WURQ02] (der Laudianus dagegen schreibt die Nomina sacra aus.)"
Foliation: ff. a-c + i*-iii* + 1* + 1-265 + i-v + d-g.
Language: Latin and Old English.
Contents:
0.1.
1r-74r Gospel of Matthew []
[Nasmith:] Evangelia quatuor Latine secundum versionem D. Hieronimi [] , haud tamen absque majoris momenti lectionibus ab editione vulgata discrepantibus. De hoc autem codice notandum est eum ab aliis antiquissimis codicibus, quos in Anglia [] scriptos esse constat, cum quoad membranorum faciem tum quoad atramenti colorem tum denique quoad literarum ductum maxime differre. Quae quidem cum aliis infra dicendis rationibus faciunt ut credam hunc codicem unum esse eorum quos ad Augustinum [] Anglorum apostolum et primum Dorobernensem archiepiscopum mille et centum abhinc annis misit Gregorius magnus papa Romanus [] . De libris ab eo in Angliam [] missis consulat eruditus lector Iohannem Diaconum [] in vita Gregorii magni [] cap. 37. et Beda [] historiam ecclesiasticam lib. i. cap. 29
f. 1r begins imperfectly in capitula of Matthew
[]
(xii)
Incipit:
(Nine)uitarum signum pharisaeis tradit
matrem et fratres spernit xxviii ends
Explicit: et doctrina eius de baptismo
Rubric: Explicuerunt
(red)
1r
2r
()
2r
()
, Cambridge 1912
Stanley: L. 15 TJames: 136
2r
3r
()
()
Below this is written (xi?
7 tate"
Rubric: Incipit ipse liber
On f. 2v is only Mattheus
[]
hominem in large capitals
Text begins at top of f. 3r
Incipit: Liber generationis
) "Siferð
On f. 194v, col. 2 "passio dni nri" is written in the hand of the later corrector (English minuscule of cent.
viii?)
Ends
205vRubric: Explicit Euangelium secundum Luca
[]
.
[]
```
Incipit secundum Iohanne Inc. prologus eiusdem. Deo gratias 205v () Here a leaf with the frontispiece to John is missing. There are slight stains on f. 206r Headline 206r Rubric: Praefatio 206r Incipit: Iohannes euangelista 206v () Explicit: doctrina seruetur. Amen 206v () Rubric: Explicit prologus Incipiunt capitula 207r Incipit: i Pharisaeorum leuitae 207v () Explicit: xiv -Et resurrectio eius 207v () Rubric: Expliciunt capitula. incipit ipse liber At top of 207v in rustic capitals + More volans aquilae petit astra Iohannes [] Text 208r Incipit: In principio erat uerbum On f. 256r is a spirited sketch of a man in a pointed cap gesticulating: probably meant for a Jew Ends 265v Rubric: Explicit Euangelium secundum Iohannem [] Deo gratias semper. Amen 1. 74v-74v Grant of renders from land at Brabourne, Kent [] by Ealhburg [] to St Augustine's Abbey [] , c. A.D. 850 [Nasmith:] Quod quidem testamentum publicavit D. Georgius Hickesius [] in dissertatione sua epistolari On f. 74v, in fine round black hand, the Will of Ealhburh [] 74v Incipit: In nomine domini ealhburh [] hafaþ geset myd hyre freonda (facsimile in Goodwin, Cambridge Antiquarian Society 1847, pl. 1 [Goodwin 1847] ) 74v () Explicit: agife land 7 bec þam hiƿum to sanctæ agustine [] Wanley, p. 151 [Wanley 1705] S 1198 [Sawyer 1968] Testamentum Ealhburgae [] in quo recitantur quae legavit monasterio S. Augustini [] 2. 77v-77v Agreement between Wulfric, abbot of St Augustine's, Canterbury [] , and Ealdred, son of Lyfing [] , about land at Clife, Kent [] , c. A.D. 990 x 1005 On f. 77v, originally blank, in good black hand 77v () Incipit: In nomine domini nostri Iesu Christi her sƿutelað on þisum geƿrite hu ƿulfric abb. (facsimile in Goodwin, l.c. [Goodwin 1847] ) 77v () Explicit: to hyra saƿle ðearfe á butan ende; amen Wanley, p. 157 [Wanley 1705] S 1455 [Sawyer 1968] Conventio Saxonice scripta [Paulo ante initium evangelii secundum D. Marcum] quae facta fuit inter Wulfricum abbatem [] [qui floruit A.D. 949 ] et Ealredum Lifingi filium [] 3. ir-ir Agreement about land at Wicham [] ir () Incipit: Item de terra WICHAM [] nominata, etc. This is in a hand very closely resembling that of the Missal MS 270 [CCC270] Redditio terrae de Wicham [] Deo et S. Augustino [] et domino Hugoni abbati [] per Robertum Fresla [] , in illa quadragesima in qua rex Henricus [] dedit filiam suam imperatori 4. ir-ir Agreement between Osbern de Ripla [] and St Augustine's Abbey []
```
7.
iiv-iiv
8.
iiv-iiv
9.
iiv-iiv
10.
iiir-iiir
11.
iiir-iiir
Conventio inter Osbernum de Ripla [] filiosque ejus et abbatem S. Augustini [] de annua pensione XVIs. VIIId. solvenda ex terra de Ripla []
ir
() Incipit: Hec est actio que facta est in presentia hugonis abbatis secundi []
ir () Explicit: Anno ab incarnatione domini Mill mo c o xlvi to xv mo kal. apr. apud Norburnam [] in Hallimoto In a good black pointed hand
5.
iv-iir List of relics
Reliquiae quae sunt in uno parvo nigro scrinio uno flore notato
iv () Incipit: Héé sunt reliquie in uno paruo nigro scrinio flore uno signato. De ligno domini plures particule. De sepulchro domini. De Scapula Sancti Nicomedis martiris [] . De Capillis Sancte Cecilie uirginis et martiris [] , De Sancta Margareta [] . De Sancto Ianuario [] . De uestis Sancte Marie [] . De ossibus et uestis Sancti Clementis martiris [] . De uestis Sancte Cecilie [] . De Sancto Antonio episcopo [] . De Sancto Laurentio martire [] . De Sancto Johanne Baptista [] os unum. De Sancto Pancratio martire [] . Costa de Sancto Mathia Apostolo [] . De Sanctis Wandregesilo [] -Martino [] - Medardo [] atque Gildardo [] , Odulfo episcopo [] , Audoeno [] , Dens Sancti Vedasti [] , De Sanctis Wlgaro [] , Paulino [] , Affre [] , Geruasio [] , Ambrosio [] . De cruce Sancti Andree apostoli [] , De Sanctis Mildretha [] , Wilfrido [] , Eadgitha [] , Folquino [] , Walburga [] , Amato Episcopo [] , Petrocio [] , Bartholomeo Apostolo [] , Tecla [] . Digitus Sancti Gregorii [] . De Sancto Jacobo Apostolo fratre Sancti Johannis [] . De Sanctis Nicholao [] , Leonardo [] , Benedicto [] et alie plures reliquie sine scriptis. Et de Sancta Fide Virgine []
iv () In a separate line: "Hollord [] . Ketil [] . Ozor [] . Yun [] . Andreus [] . Asclathe [] " iir blank
6.
iiv-iiv Agreement about a hill near Sakenhethe []
Concessio collis, qui est proximus Sakenhethe [] , Jacobo filio Gilrici [] per Robertum abbatem [] et conventum, ea conditione ut dictus Jacobus [] ibi faciet unam salinam et reddet annuatim ad curiam de Cistelet [] II ferdendellos salis et V solidos
On f. iiv in charter hand of cent. xiii, of the time of Abbot Robert (de Bello) [] 1224-1252
Agreement about seven acres in Betleshangre
[]
Concessio 7 acrarum in Betleshangre [] Willelmo filio Hugonis de Betleshangre [] per Robertum abbatem [] et conventum, reservata pensione XLII denariorum curiae de Norb. [] annuatim solvenda
On f. iiv in charter hand of cent. xiii, of the time of Abbot Robert (de Bello) [] 1224-1252
Agreement about the messuage of Colombine the cleric
[]
Concessio messuagii Columbino clerico [] per eundem abbatem et conventum, reservata pensione Xs
On f. iiv in charter hand of cent. xiii, of the time of Abbot Robert (de Bello) [] 1224-1252
Agreement about the messuage of Benedict son of Radulph []
Concessio messuagii Benedicto filio Radulphi [] per abbatem et conventum reservata pensione XIIIIs. annuatim
On f. iiv in charter hand of cent. xiii, of the time of Abbot Robert (de Bello) [] 1224-1252
Agreement about ten and a half acres at Estbotleshangre []
Concessio 10 acrarum terrae et dim. in villa de Estbotleshengre [] Hamoni filio Willelmi de Botleshanger [] per Robertum elemosinarium [] cum consensu abbatis et conventus
On f. iiir in charter hand of cent. xiii, of the time of Abbot Robert (de Bello)
[]
1224-1252
Confirmation of the previous agreement about ten and a half acres at Estbotleshangre []
12.
iiir-viv
Confirmatio ejusdem donationis per abbatem et conventum
On f. iiir in charter hand of cent. xiii, of the time of Abbot Robert (de Bello) [] 1224-1252
Agreement about the garden of William son of John of Fenglesham
[]
Concessio cujusdam horti Willelmo filio Iohannis de Fenglesham [] per dictum elemosinarium
On f. iiir in charter hand of cent. xiii, of the time of Abbot Robert (de Bello) [] 1224-1252 iiiv-viv blank: unimportant scribbles on f. ivv vr.
() On the paper flyleaf at end is this note: "Codex tanta similitudine codicis Amiatini [BMLAM1] excellit ut omnino saeculi vi esse dicendus sit. M. mart. 9. a. 1865. Const. Tischendorf [] "
CCC: space available for notes on the current status of the encoding
text: copied from James.txt SP
markup: SP
markupCheck: checked by SP, BA, CF
msCheck: RJR 16/12/2008
remarks:
|
<urn:uuid:34829071-8f02-45be-bb29-501e6b1883e4>
|
CC-MAIN-2023-06
|
https://stacks.stanford.edu/file/druid:gz989vf7295/286.pdf
|
2023-02-03T21:00:27+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-06/subset=warc/part-00242-b5ddf469-bf28-43c4-9c36-5b5ccc3b2bf1.c000.gz.parquet
| 563,982,681
| 4,046
|
eng_Latn
|
eng_Latn
| 0.460663
|
eng_Latn
| 0.48064
|
[
"eng_Latn",
"eng_Latn",
"lat_Latn",
"lat_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
5533,
5741,
8386,
11852,
12700
] |
PRODUCT INFORMATION
SOLID © BLOCKBOARD
SOLID Double Core 5 Layers
Deck
Core
Glue
Emission class
Format
Thickness
Max. press format
Moisture content
Thickness tolerance
Tolerance in length
Tolerance in width
Squareness tolerance
Fromager, poplar or beech rotary cut veneer
Spruce, fuma or poplar staves
IF 20; AW 100 available on request
E1; E0 on request
1870 × 2200 / 2250 mm
1250 × 2200 / 2500 mm
34 / 39 / 41 / 44 / 47 / 50 mm
Other thicknesses available on request
2200 × 6300 mm
8 – 12%
+ 0,2 mm – 0,6 mm
± 2 mm/m ± 5 mm/m
1 mm/m
Multiple applications
Significant advantages
High quality
HS Baco Panels offers the most suitable blockboard for each application.
[x] High stability and moisture resistance
[x] High bending strength
A wide range of surface and cores ensure various alternatives. Additionally we develop solutions together with our customers, according to their individual requirements.
[x] Light weight
[x] High screw extraction resistance
[x] Easy processing
HS Baco Panels S.R.L.
Strada Crinului nr. 15, 605200 Comănești, România
T: +40 234 374 052
F: +40 234 374 622
High quality raw material and longtime experience of our team are the basis for the outstanding quality of our blockboards.
Continuous quality controls ensure stable standards.
All wood that is processed by HS Baco Panels comes from PEFC™ controlled sources.
[email protected]
www.hs.ro www.hs.at
|
<urn:uuid:db1d84e3-e126-488c-9711-e5b0d038fc1e>
|
CC-MAIN-2021-04
|
https://hs.at/fileadmin/files/all/Production/BACO_Data_Sheets/9_SOLID_Double_Core_5_layers_01.pdf
|
2021-01-20T12:40:39+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-04/subset=warc/part-00276-364a895c-5e5c-46bb-846e-75ec7de82b3b.c000.gz.parquet
| 378,119,000
| 386
|
eng_Latn
|
eng_Latn
| 0.621512
|
eng_Latn
| 0.621512
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
1428
] |
Monthly donation per budget St. Luke's Episcopal Church
"To know Christ and make Him known"
The Second Sunday after Pentecost June 19, 2022
St. Luke's Episcopal Church
"To know Christ and make Him known"
The Second Sunday after Pentecost June 19, 2022
Today's Hymns
Today's Hymns
Prelude: Praise and Worship
by Various Artists
Opening Hymn: #433
"We gather together"
Sequence Hymn: #441
"In the cross of Christ I glory"
Offertory: "I Believe"
by Ervin Drake
(Rich B., soloist)
Post Comm. Hymn: #313
"Let thy Blood in mercy poured"
Closing Hymn: #561
"Stand up, stand up, for Jesus"
Postlude: The Trees of the Field
by Stuart Dauermann
Today's Lessons
1 st
Reading: Isaiah 65:1-9
Psalm: 22:18-27
2 nd
Reading: Galatians 3:23-29
Gospel: Luke 8:26-39
Prelude: Praise and Worship
by Various Artists
Opening Hymn: #433
"We gather together"
Sequence Hymn: #441
"In the cross of Christ I glory"
Offertory: "I Believe"
by Ervin Drake
(Rich B., soloist)
Post Comm. Hymn: #313
"Let thy Blood in mercy poured"
Closing Hymn: #561
"Stand up, stand up, for Jesus"
Postlude: The Trees of the Field
by Stuart Dauermann
Today's Lessons
1 st Reading: Isaiah 65:1-9
Psalm: 22:18-27
2
nd
Reading: Galatians 3:23-29
Gospel: Luke 8:26-39
The Altar Flowers are given this week to the Glory of God by Diana Anderson in thanksgiving for the birth of grandson, Jason Richard on May 1, 2022.
The Altar Flowers are given this week to the Glory of God by Diana Anderson in thanksgiving for the birth of grandson, Jason Richard on May 1, 2022.
The Aumbry Light burns this week to the Glory of God by Cinni Cummings in memory of Deputy Sheriff Glenn Hilliard.
The Aumbry Light burns this week to the Glory of God by Cinni Cummings in memory of Deputy Sheriff Glenn Hilliard.
Parish Intercessory Prayer List
Our Armed Forces throughout the World, Firefighters, and Police Officers. Howard Allen, Joyce Allen, Toni Axelson, Peggy Battle, Doug Butler, Stephanie Capps, Mic Carlton, Gail Cocking, Holly Coxe, Linda Crescenzo, Janalee Crosley, Isabella Deiner, Scott Douglas, Frank Eldridge, Rev. Carlyle Gill, Linda Gilmore, Tom Gilmore, George Gittleman, Jan Grantz, Ronald Grantz, Sheldon Hayman, Nina Hike, John Hollis, Carlie Irving, Denise Jackson, Keith Jackson, Tangie Jackson, Valerie Jefferson, Diane Jones, Teresa Kuehlwein, Elise Letavish, Keith Lewis, Sam Ligon, Norma Lee Lingo, Susan Lloyd, Desi Logullo, Dick Mickles, Charles Mickles, Jr., Marty Mickles, Will Miller, Audrey Mitts, Betsy Moore, William & Virginia Newman, Stephen Ortiz, Erik Paeks, Rita Paulsen, Scott Paulsen, Ed Pentoney, Ms. Peterson, Penny Harkle Road, Jackie Robinson, John Shaw, Ryan Shockley, Joy Sikora, Chris Spandikow, Jerry & Johann Stover, Mary Svaby, Janet Wigton, Carolyn Wilkerson, Jim Wilkerson, Grace Woodrum, Brian, Karen, Janet, Wesley, Heather, Father Justin & Family, Peggy, Sarah, Soren, Dean
St. John's Food Pantry is in need of mac & cheese, peanut butter, and jelly; Love INC requests cereals, canned meat and other non-perishables. These items can brought to church on Sundays and placed in the baskets in the Narthex. Thank you for your support of this ministry.
Parish Intercessory Prayer List
Our Armed Forces throughout the World, Firefighters, and Police Officers. Howard Allen, Joyce Allen, Toni Axelson, Peggy Battle, Doug Butler, Stephanie Capps, Mic Carlton, Gail Cocking, Holly Coxe, Linda Crescenzo, Janalee Crosley, Isabella Deiner, Scott Douglas, Frank Eldridge, Rev. Carlyle Gill, Linda Gilmore, Tom Gilmore, George Gittleman, Jan Grantz, Ronald Grantz, Sheldon Hayman, Nina Hike, John Hollis, Carlie Irving, Denise Jackson, Keith Jackson, Tangie Jackson, Valerie Jefferson, Diane Jones, Teresa Kuehlwein, Elise Letavish, Keith Lewis, Sam Ligon, Norma Lee Lingo, Susan Lloyd, Desi Logullo, Dick Mickles, Charles Mickles, Jr., Marty Mickles, Will Miller, Audrey Mitts, Betsy Moore, William & Virginia Newman, Stephen Ortiz, Erik Paeks, Rita Paulsen, Scott Paulsen, Ed Pentoney, Ms. Peterson, Penny Harkle Road, Jackie Robinson, John Shaw, Ryan Shockley, Joy Sikora, Chris Spandikow, Jerry & Johann Stover, Mary Svaby, Janet Wigton, Carolyn Wilkerson, Jim Wilkerson, Grace Woodrum, Brian, Karen, Janet, Wesley, Heather, Father Justin & Family, Peggy, Sarah, Soren, Dean
St. John's Food Pantry is in need of mac & cheese, peanut butter, and jelly; Love INC requests cereals, canned meat and other non-perishables. These items can brought to church on Sundays and placed in the baskets in the Narthex. Thank you for your support of this ministry.
|
<urn:uuid:aa1d3d81-e306-44ae-887f-49f81b59a2a2>
|
CC-MAIN-2022-27
|
http://nebula.wsimg.com/29ada8491c89fb34431cc8700aaad7a9?AccessKeyId=23B3614EC57E5741A328&disposition=0&alloworigin=1
|
2022-06-30T01:39:51+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-27/subset=warc/part-00234-48f675b2-7fd4-43af-adb3-2a4ea7f82193.c000.gz.parquet
| 39,897,871
| 1,354
|
eng_Latn
|
eng_Latn
| 0.844296
|
eng_Latn
| 0.878627
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1798,
4772
] |
A Surrey State of Affairs
ISBN:
view in catalog [1]
9780670023424
and letters. You really feel as though the writing comes directly from the blogger's heart. Ceci Radford's wonderful first novel A Surrey State of Affairs [2]provides hundreds of delightful escapades while involving you with a cast of peculiar though mostly likeable characters. Here's the plot in a nutshell: on the advice of Rupert, her IT consultant son, a middle-aged married suburbanite named Constance begins a blog where she tells of exciting and not-soexciting events in her life. She doesn't work outside the home and has a surly eastern European housemaid named Natalie. Constance's main hobbies are throwing dinner parties (including faux detective ones), visiting her Mom in a nursing home, and improving her skills as a competitive church bell ringer. (Who knew Brits even competed at this?)
Because they seem so personal and individual, I'm attracted to novels written in blogs, diaries,
Pretty soon, you discover that she is also heavily involved in matchmaking: the aforementioned son with the minister's daughter and also with a bell-ringer's child. Did anyone accidentally give out her son's address to a gentle stalker?
Radford captures teenage angst and other family dynamics exceptionally well. Her entrance into Facebook is a hoot and before long the family travels to the Caribbean where she must bare skin. Here she enjoys revenge by emptying out a sunscreen bottle and transferring oil into it to get back at the obnoxious Russian. The family also takes a ski trip to Switzerland where Constance suffers a humiliating and unnecessary mountain top rescue. Like any good English woman, she came prepared with her thermos of tea and biscuits so she could have endured the ice-fog for much longer.
While Constance learns the nitty gritty of posting blogs, she entertains her husband's burly Russian guest who has nasty spats with Natalie, and then takes off with Sophie. Oh Sophie! I failed to mention Constance's 18 year old surly daughter who is on her gap year counting fish in France but comes home often for non-talking visits with Mom.
The reader soon becomes aware of strong fissures in Constance's life; i.e. her marriage and her unrealistic expectations for her children, but it's all good fun. There's a great South American travel episode also where Constance finally learns to do exactly what she wants to do rather than what's expected of her.
For books full of understated British humor about family relationships, try these two by Tessa Hadley, The Master Bedroom [3]and her latest, a collection of stories called Married Love [4]. For the Love of Reading [5] Information, Answers & Reviews [6] A Surrey State of Affairs [7] Fiction [8] Posted by Dory L. on Dec 7, 2012
[9]
[10]
[11]
Links:
[2] http://mcpl.monroe.lib.in.us/search/searchresults.aspx?ctx=1.1033.0.0.7&type=Keyword&term=a%20surrey%20state%20of%20affairs&by=KW&sort=RELEVANCE&limit=TOM=*&query=&page=0
[1] http://mcpl.monroe.lib.in.us/search/searchresults.aspx?type=Boolean&term=isbn=9780670023424%20or%20upc=9780670023424&by=KW&sort=RELEVANCE?utm_source=blogpost&utm_medium=publicsite&utm_campaign=blogpost
[3] http://mcpl.monroe.lib.in.us/search/searchresults.aspx?ctx=1.1033.0.0.7&type=Keyword&term=master%20bedroom%20tessa%20hadley&by=KW&sort=RELEVANCE&limit=TOM=*&query=&page=0bedro
[5] http://mcpl.info/bookblog
[4] http://mcpl.monroe.lib.in.us/search/searchresults.aspx?ctx=1.1033.0.0.7&type=Keyword&term=married%20love%20tessa%20hadley&by=KW&sort=RELEVANCE&limit=TOM=*&query=&page=0
[6] http://mcpl.info/category/blogs/information-answers-reviews
[8] http://mcpl.info/category/reviews-subjects/fiction
[7] http://mcpl.info/category/reviews-titles/surrey-state-affairs
[9] http://mcpl.info/print/printpdf/blogs/love-reading/surrey-state-affairs?page=1
[11] http://mcpl.info/printpdf/printpdf/blogs/love-reading/surrey-state-affairs?page=1
[10] http://mcpl.info/printmail/printpdf/blogs/love-reading/surrey-state-affairs?page=1
|
<urn:uuid:7de8e6bc-2738-4997-a11d-dc45fead01a0>
|
CC-MAIN-2016-40
|
http://monroe.lib.in.us/printpdf/blogs/love-reading/surrey-state-affairs?page=1
|
2016-09-30T07:22:26Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662058.98/warc/CC-MAIN-20160924173742-00235-ip-10-143-35-109.ec2.internal.warc.gz
| 179,060,440
| 1,064
|
eng_Latn
|
eng_Latn
| 0.605313
|
eng_Latn
| 0.991184
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2786,
4029
] |
SONGNOX ® DSTDP
Technical Information
1. Components Distearyl thiodipropionate
3
C
C
H
2
C
H
2
O
S
C
H
2
C
H
2
CO
O
C
1
8
H
3
7
H
7
C
1
8
CAS No : 693-36-7
MW: 683
2. Properties
Melting Point (℃)
63.5 ~ 68.5
Ash (%)
Max. 0.05
Volatile Loss (%)
Max. 0.50
Color (Molten, APHA)
Max. 50
Acid Value (mgKOH/g)
Max. 0.10
Assay (%)
Min. 99.0
3. Characteristics & Usages
* Secondary thio's ester antioxidant for organic polymers
* Decomposes and neutralizes hydroperoxides, formed by auto-oxidation of polymers.
* Antioxidant for Plastics, Rubber, synthetic Fiber, Fat and Oils, Petroleum products.
* The initial color may be improved.
* Efficient stabilizer for polyolefins, particularly PP and HDPE.
* Mainly used in PE, PP, ABS, HIPS, Polyester and polyamide.
* Can be used as a synergist in combination with phenolic antioxidants.
- Enhance aging and light stability.
* For additional information please consult the Material Safety Data Sheet.
4. Physical Form Powder, SB (Semi Bead)
5. Packing unit
25Kg Carton Box, 50Kg Fiber Drum, 500Kg Flecon Bag.
|
<urn:uuid:50c3ff34-44d0-4e9d-92ae-2120efa244c3>
|
CC-MAIN-2024-42
|
http://gzbirdchem.com/Upload/Files/songyuan/TDS-E@SONGNOX%20DSTDP.pdf
|
2024-10-08T21:02:40+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-42/subset=warc/part-00224-0c083cf2-c0ed-42ad-af5c-44f7548e96a0.c000.gz.parquet
| 12,089,010
| 358
|
eng_Latn
|
eng_Latn
| 0.498684
|
eng_Latn
| 0.498684
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
1097
] |
Insurance Authorization - For rTMS Therapy Insurance networks commonly require prior authorization before you begin treatment. In an effort to help protect each of our patients, we attempt to ensure appropriate authorization is obtained from your health insurance company prior to treatment.
Most insurances will require the following:
• A diagnosis of depression (moderate to severe)
• A minimum of 2 to 4 antidepressant trials with little or no benefit from symptoms or medication discontinuation due to side effects.
• A history of psychotherapy (therapists, counselor, group therapy, outpatient therapy, extended visits with a psychiatrist, or psychologists)
• No history of seizures
• No rTMS Therapy treatment contraindications
• Insurance companies require medical record documentation of all of the above, including other qualifying information, in order to obtain prior authorization for rTMS therapy services. The TMS Collaborative will request your medical records from your behavioral health care providers in order to have this information on file and for insurance pre-authorization.
The TMS Collaborative will submit a prior authorization to your insurance upon receipt of all required documentation from you and your current or previous behavioral health care providers. Therefore, by signing this form you grant permission for The TMS Collaborative to submit a prior authorization request to your insurance provider for any treatment services and/or for services to be provided to you by one of our physicians or healthcare providers? By signing below, I acknowledge that The TMS Collaborative will submit a prior authorization to my insurance upon receipt of all required documentation from me and or my current or previous behavioral health care providers. I provide permission for The TMS Collaborative to submit a prior authorization request to my insurance provider for TMS therapy (transcranial magnetic stimulation) and/or for services to be provided to you by one of our physicians or healthcare providers.
Insurance and Financial Responsibility Information: By signing this form, you acknowledge that your insurance coverage, notification of any pre-authorization requirements, and terms of coverage are ultimately your responsibility. You acknowledge that insurance verification checks may not always reflect recent insurance claims, coverage of benefits, or other information. We make every attempt to verify your benefits and obtain preauthorization and will communicate this to you. If it is not provided or different from what is communicated to us by your insurance provider, you understand that benefits checks and pre-authorization are not a guarantee of payment. Pre-authorization is intended for your benefit and to help ensure payment from your insurance provider. If pre-authorization is obtained, but your insurance provider rejects services, you may still be responsible for the payment of services provided. We make every effort to obtain pre-authorization for services prior to the start of care and will communicate coverage with you. However, insurance changes occur during the course of treatment and it is your responsibility to notify our office of any changes. In some instances, clients may receive a statement due to insurance changes or other reasons. We accept payment via credit card, cash, or health savings card (HSA) at each location. We do not accept credit card payments over the phone and do not keep credit or debit card information on file within our billing system.
Cancellation Policy: For cancellations made 24 hours or more in advance, no charge will be incurred by the patient for a cancelled appointment. If a patient does not call within 24 hours to cancel their appointment, they will be charged $50. We understand that emergencies and unexpected events occur. In those cases, please call the office as soon as you are able to explain to the staff what occurred and they will determine whether you are subject to a cancellation fee or not. By signing below, I understand and acknowledge The TMS Collaborative PPLC’s cancellation policy and the fees associated with it.
Patient Acknowledgment: by signing this form, you’re acknowledging to the best of The TMS Collaborative PLLC’s ability they have answered your treatment-related questions. I am also aware of the HIPAA Notice and Patient Privacy Act. I am informed of The TMS Collaborative Hearing Protection Policy and I understand I may elect to decline to wear earplugs during treatment.
Any treatment-related questions I had prior to treatment were asked and answered to my satisfaction. If I am not aware of any, or all of the above notices or policies, I will request a further explanation from The TMS Collaborative prior to acknowledging this document. I also agree to not hold The TMS Collaborative and each of its employees and physicians liable from any adverse side effects or events that may result from any and all of my interventional psychiatry treatments with The TMS Collaborative. I fully understand the indications for and any side effects of rTMS Therapy including an explanation of clinic treatments I am seeking for major depression or any other diagnoses. For the therapy I am seeking, I have had all of my questions and/or concerns answered. Therefore, I authorize The TMS Collaborative to communicate with my health insurance company and any clinicians that I have received or am seeking treatment at The TMS Collaborative. Therefore, for the purpose of any pre-authorization and for any other purposes that may arise as a result of my relationship with The TMS Collaborative, my signature below acknowledges that I have read or I have waived the right to read The TMS Collaborative’s guide for any of their therapies.
Name *
First Name Last Name
Birthday *
Month Day Year
Email
[email protected]
Address *
Street Address City State Zip Code
Street Address
Street Address Line 2
**Cell Phone Number**
Please enter a valid phone number.
**Emergency Contact Name ***
First Name Last Name
**Emergency Contact Phone Number ***
Please enter a valid phone number.
**Today's Date ***
Month Day Year
CONSENT TO RELEASE MEDICAL INFORMATION
TMS COLLABORATIVE
9 HAMPTON RD, UNIT 2, EXETER, NH 03833
603-778-0505
Name
First Name Last Name
Birthday
Month Day Year
I hereby authorize the below providers to use or disclose, in verbal and/or written form, the specific information requested below, to The TMS Collaborative PLLC for the purpose of receiving TMS therapy treatment for the purpose of obtaining insurance prior-authorization this treatment.
Clinician that prescribes you your behavioral health medications
Prefix First Name Last Name Suffix
Phone Number
Area Code Phone Number
Fax Number
Area Code Phone Number
Primary Care Clinician if different from above
Prefix First Name Last Name Suffix
Phone Number
Area Code Phone Number
Fax Number
Area Code Phone Number
Current or past Therapist
Prefix First Name Last Name Suffix
Phone Number
Area Code Phone Number
Fax Number
Area Code Phone Number
Type of Medical Information to be disclosed
☐ All Medical Records ☐ Current / Previous Medications
Other Information allowed to be disclosed
☐ I give consent to the release of information pertaining to drugs and alcohol
☐ I give consent to the release of information pertaining to mental health diagnosis or treatment.
Information is being requested for the following purpose(s): Repetitive Transcranial Magnetic Stimulation (rTMS therapy) and this authorization shall remain in effect for 1-year from the below date of consent. I understand that I may inspect or copy the protected health information to be used or disclosed. I understand that I may revoke this authorization any time before the expiration date (except to the extent that actions have been taken in reliance on it) by submitting a written revocation letter to The TMS Collaborative. Information used or disclosed pursuant to the authorization may be subject to re-disclosure by the recipient and no longer be protected by HIPAA. I may refuse to sign this authorization and I hereby release The TMS Collaborative PLLC from any and all legal responsibility or liability or for any
consequences of either: 1) having non-stipulated information maintained in confidence or privacy, or 2) disclosing stipulated
**Date Signed**
Month Day Year
NOTICE TO RECEIVING AGENCY: The patient’s record is privileged information, which is protected by various State and Federal laws. Such information may not be disclosed to other persons or entities, including those within the organization wherein the patient is employed, without a separate written authorization from the patient.
**Parent or Legally Authorized Representative**
In case the subject is beyond the legal age of consent:
**Name of Parent or Guardian**
First Name Last Name
**Relationship to Subject**
**Date Signed**
Month Day Year
Diagnosis and Antidepressant History
Please select all that apply and use drop down boxes where appropriate
Name
First Name Last Name
What is the patient's primary diagnosis?
- F33.1 Major depressive disorder, recurrent, moderate
- F33.2 Major depressive disorder, recurrent severe without psychotic features
- Other Diagnosis
If diagnosis is other please describe below
Lifetime Antidepressant History - Please select all that apply
| Select All That Apply | Dosage - Select From Dropdown | Duration - Approx. Year Started and Length of Time Used | Current or Reason For Discontinuation - Dropdown |
|-----------------------|-------------------------------|--------------------------------------------------------|--------------------------------------------------|
| Citalopram (Celexa) | | | |
| Escitalopram (Lexapro)| | | |
| Fluoxetine (Prozac) | | | |
| Fluvoxamine (Luvox) | | | |
| Paroxetine (Paxil) | | | |
| Sertraline (Zoloft) | | | |
| Desvenlafaxine (Pristiq) | | | |
| Antidepressant | Brand Name |
|---------------|-------------|
| Duloxetine | Cymbalta |
| Levomilnacipran| Fetzima |
| Venlafaxine | Effexor |
| Vilazodone | Viibryd |
| Vortioxetine | Trintellix |
| Trazodone | Desyrel |
| Bupropion | Wellbutrin |
| Amitriptyline | Elavil |
| Clomipramine | Anafranil |
| Desipramine | Norpramin |
| Doxepin | Adapin |
| Imipramine | Tofranil |
| Nortriptyline | Pamelor |
| Maprotiline | Ludomil |
| Mirtazapine | Remeron |
Any Antidepressant Rx that isn’t on the above list can be listed in the space below
PATIENT HEALTH QUESTIONNAIRE-9 (PHQ-9)
Over the last 2 weeks, how often have you been bothered by any of the following problems?
(Use “✓” to indicate your answer)
| | Not at all | Several days | More than half the days | Nearly every day |
|---|------------|--------------|------------------------|------------------|
| 1. Little interest or pleasure in doing things | 0 | 1 | 2 | 3 |
| 2. Feeling down, depressed, or hopeless | 0 | 1 | 2 | 3 |
| 3. Trouble falling or staying asleep, or sleeping too much | 0 | 1 | 2 | 3 |
| 4. Feeling tired or having little energy | 0 | 1 | 2 | 3 |
| 5. Poor appetite or overeating | 0 | 1 | 2 | 3 |
| 6. Feeling bad about yourself — or that you are a failure or have let yourself or your family down | 0 | 1 | 2 | 3 |
| 7. Trouble concentrating on things, such as reading the newspaper or watching television | 0 | 1 | 2 | 3 |
| 8. Moving or speaking so slowly that other people could have noticed? Or the opposite — being so fidgety or restless that you have been moving around a lot more than usual | 0 | 1 | 2 | 3 |
| 9. Thoughts that you would be better off dead or of hurting yourself in some way | 0 | 1 | 2 | 3 |
For office coding: ______ + ______ + ______ + ______ = Total Score: ______
If you checked off any problems, how difficult have these problems made it for you to do your work, take care of things at home, or get along with other people?
Not difficult at all □ Somewhat difficult □ Very difficult □ Extremely difficult □
Developed by Drs. Robert L. Spitzer, Janet B.W. Williams, Kurt Kroenke and colleagues, with an educational grant from Pfizer Inc. No permission required to reproduce, translate, display or distribute.
|
<urn:uuid:b5bc13af-60e9-46d8-ac6c-6882669fa42b>
|
CC-MAIN-2023-23
|
https://tmscollaborative.com/wp-content/uploads/TMS-Forms.pdf
|
2023-05-31T00:35:50+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-23/subset=warc/part-00196-ffa3bf93-6ba1-4a27-adea-b0baae3b4389.c000.gz.parquet
| 648,336,061
| 2,681
|
eng_Latn
|
eng_Latn
| 0.960451
|
eng_Latn
| 0.993512
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
3530,
5899,
6159,
6791,
8249,
8962,
10900,
11547,
13233
] |
ATTACHMENT A
OFFICIAL PROPOSAL PRICE SHEET
Note: The Official Proposal Price Sheet must be submitted in a separate envelope or e-mail and not part of the technical evaluation. Any reference to pricing in the technical proposal shall be cause for disqualification from further considerations for award.
1. Any cost not identified on this schedule but subsequently incurred will be the responsibility of the Vendor.
2. Bids should provide at least a 180-day acceptance period.
3. By submission of a proposal, the proposer certifies the following:
A. Prices in this proposal have been arrived at independently, without consultation, communication, or agreement for the purpose of restricting competition;
B. No attempt has been made nor will be by the proposer to induce any other person or firm to submit a proposal for the purpose of restricting competition;
C. The person signing this proposal is authorized to represent the company and is legally responsible for the decision as to the price and supporting documentation provided as a result of this RFP; and
D. Prices in this proposal have not been knowingly disclosed by the proposer and will not be prior to award to any other proposer.
The Official Price Proposal Sheet must be submitted in the following form, allowing for the inclusion of specific information regarding positions, goods, services, etc., and signed by an official authorized to bind the Vendor to a resultant contract.
| DESCRIPTION | PRICE PER HOUR | NUMBER OF POSITIONS |
|--------------------------------------------------|----------------|---------------------|
| Corporate Officer-in-Charge | $225 | 1 |
| Project Director | $225 | 1 |
| On-Site Project Manager | $225 | 1 |
| Senior Consultants/Subject Matter Experts | $225 | 3 |
| Senior Analysts (Budget, Data, and Research Analysts) | $175 | 3 |
| DESCRIPTION | PRICE PER UNIT (if applicable) | TOTAL PRICE |
|--------------------------------------------------|--------------------------------|-------------|
| Subcontractors (if any) | Subcontractor costs are included in the hourly rates quoted above. | 0 |
| Travel | All travel expenses and incidental costs are included in hourly rates above. | 0 |
| Any Additional Goods & Services | Material costs are included in hourly rates. | 0 |
| (List Individually) | | |
TOTAL MAXIMUM AMOUNT OF BID: $298,125
This bid is valid for a minimum of 180 days from August 18, 2017.
Eric B. Schnurer, President
Public Works LLC
|
<urn:uuid:3c9d8bf0-3ebb-437d-80c1-c4f755d5e380>
|
CC-MAIN-2021-43
|
https://www.arkleg.state.ar.us/Calendars/Attachment?committee=010&agenda=I15908&file=Public+Works+Price+Sheet.pdf
|
2021-10-21T01:49:58+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-43/subset=warc/part-00255-16202947-a809-4711-8221-79ab0a79d5b1.c000.gz.parquet
| 721,519,645
| 542
|
eng_Latn
|
eng_Latn
| 0.995875
|
eng_Latn
| 0.995875
|
[
"eng_Latn"
] | false
|
docling
|
[
2961
] |
Quinolones Residue Rapid Test Strip (Tissue) (DTS1025L)
This product is for research use only and is not intended for diagnostic use.
PRODUCT INFORMATION
Size
96T
Intended Use
Quinolones residue rapid test strip is developed for rapid test of quinolones contamination in tissue.
General Description
The quinolones are a family of synthetic broad-spectrum antibiotics. The term quinolone(s) refers to potent synthetic chemotherapeutic antibacterials. The first generation of the quinolones begins with the introduction of nalidixic acid in 1962 for treatment of urinary tract infections in humans. Nalidixic acid was discovered by George Lesher and coworkers in a distillate during an attempt at chloroquine synthesis. They prevent bacterial DNA from unwinding and duplicating. (See Mechanism of Action later.) Quinolones, in comparison to other antibiotic classes, have the highest risk of causing colonization with MRSA and Clostridium difficile. For this reason, a general avoidance of fluoroquinolones is recommended based on the available evidence and clinical guidelines. The majority of quinolones in clinical use belong to the subset fluoroquinolones, which have a fluorine atom attached to the central ring system, typically at the 6-position or C-7 position.
Principles of Testing
Quinolones residue rapid test strip is based on competitive indirect colloid gold immunochromatography technology, in which quinolones in sample competes for the colloid gold labeled antibody with quinolone coupling antigen captured on test line.
The test result can be observed by naked eye.
Reagents And Materials Provided
1. Test strips (96tests): 8 strips/bottle, 12 bottles
2. Red powder microwells: 8 wells
3. Sample diluent(10x): 1 bottle
4. Desiccants: 2 pieces/bottle
5. Product Manual: 1 pieces
Materials Required But Not Supplied
1. Homogenizer
2. Balance
Tel: 1-631-624-4882 Fax: 1-631-938-8221
1
© Creative Diagnostics All Rights Reserved
3. Pipette
4. Tip
5. Timer
Storage
The kit can be stored at room temperature (2-30°C). The test kit is stable through the expiration date marked on the foil pouch. DO NOT FREEZE. Do not store the test kit in direct sunlight.
Specimen Collection And Preparation
Weigh 1.0±0.05g homogenized tissue sample into a 10ml polystyrene centrifuge tube, add 4ml sample diluent, and vortex for 2min to obtain the sample solution to be tested.
Reagent Preparation
Sample diluent (1x): add 1 part of 10X sample diluent to 9 parts of deionized water to obtain 1x sample diluent.
Assay Procedure
1. Please read the instructions carefully before use and return the test strips and samples to room temperature.
2. Take out the required microwells and test strips from the kit, making proper marks. Then seal the cap of the bottles, avoid moisture. (Please use the strips as soon as possible within 1 hour).
3. Use a pipette to pipette 200μL of sample into the microwell, and slowly aspirate five times until the mixture is uniform and no solid can be observed with the naked eye (this step is very important).
4. After incubating for 5 minutes at room temperature (20-25°C), insert the labeled strip into the microwell (the end printed with MAX and completely immerse it in the solution).
5. After immersing the test paper in the micropore for 5-8 minutes, judge the result according to the "Interpretation of Results", and the interpretation at other times is invalid.
Interpretation Of Results
Tel: 1-631-624-4882 Fax: 1-631-938-8221
2
© Creative Diagnostics All Rights Reserved
Sensitivity
Precautions
1. Negative: Both Control line (C line) and Test line (T line) developed red color, indicating that the sample does not contain quinolones residues or its concentration is below the detection limit.
2. Positive: Only Control line (C line) developed red color and Test line (T line) shows no color, or the color of T line is significantly weaker than C line, indicating that the quinolones residues concentration in the sample is equal to or higher than the detection limit.
3. Invalid: If there is no red line appears on Control line (C line), the result is invalid regardless of whether there is a red line on Test line (T line).
The sensitivity of quinolones residues in tissue is 30 ppb.
1. Test strips are used at room temperature for one time; do not use expired test strips.
2. Disposable tips are not reusable to avoid cross-contamination.
3. Do not to touch the white film surface in the center of the test strip during use; avoid direct sunlight and direct fan blow.
4. Tap water, distilled water or deionized water cannot be used as a negative control.
5. If you encounter any problems with the test, please contact the supplier.
Tel: 1-631-624-4882 Fax: 1-631-938-8221
3
© Creative Diagnostics All Rights Reserved
|
<urn:uuid:7c5d35f2-42ca-46ba-b2bb-79627557cd41>
|
CC-MAIN-2021-04
|
https://www.creative-diagnostics.com/pdf/DTS1025L.pdf
|
2021-01-15T23:07:29+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-04/subset=warc/part-00171-364a895c-5e5c-46bb-846e-75ec7de82b3b.c000.gz.parquet
| 766,726,454
| 1,162
|
eng_Latn
|
eng_Latn
| 0.984843
|
eng_Latn
| 0.986189
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1963,
3540,
4797
] |
CERTIFICATE OF INCORPORATION
OF A
PRIVATE LIMITED COMPANY
Company No. 07141790
The Registrar of Companies for England and Wales, hereby certifies that
STINK DIGITAL LIMITED
is this day incorporated under the Companies Act 2006 as a private company, that the company is limited by shares, and the situation of its registered office is in ENGLAND/WALES
Given at Companies House, Cardiff, on 1st February 2010
*N07141790G*
Companies House
for the record
The above information was communicated by electronic means and authenticated by the Registrar of Companies under Section 1115 of the Companies Act 2006
Company Name in full: STINK DIGITAL LIMITED
Company Type: Private limited by shares
Situation of Registered Office: England and Wales
Proposed Register Office Address: 141 WARDOUR STREET LONDON UNITED KINGDOM W1F 0UT
I wish to entirely adopt the following model articles: Private (Ltd by Shares)
Proposed Officers
Company Secretary I
Type: Corporate
Name: CARLTON REGISTRARS LIMITED
Registered or principal address: 141 WARDOUR STREET
LONDON
UNITED KINGDOM
W1F 0UT
European Economic Area (EEA) Company
Register Location: UNITED KINGDOM
Registration Number: 02035477
Consented to Act: Y Date authorised: 01/02/2010 Authenticated: YES
Company Director 1
Type: Person
Full forename(s): MR ROBERT ANTHONY
Surname: HERMAN
Former names:
Service Address: 27 SAINT HELENS GARDENS
LONDON
UNITED KINGDOM
W10 6LN
Country/State Usually Resident: UNITED KINGDOM
Date of Birth: 06/06/1964 Nationality: BRITISH
Occupation: NONE
Consented to Act: Y Date authorised: 01/02/2010 Authenticated: YES
| Class of shares | ORDINARY |
|-----------------|----------|
| Number allotted | 1 |
| Aggregate nominal value | 1.00 |
| Currency | GBP |
| Amount paid per share | 1.00 |
| Amount unpaid per share | 0.00 |
**Prescribed particulars**
THE SHARES HAVE ATTACHED TO THEM FULL VOTING, DIVIDEND AND CAPITAL DISTRIBUTION RIGHTS (INCLUDING ON WINDING UP), AND DO NOT CONFER ANY RIGHTS OF REDEMPTION.
---
| Currency | GBP |
|----------|-----|
| Total number of shares | 1 |
| Total aggregate nominal value | 1.00 |
| **Name:** | ROBERT ANTHONY HERMAN |
|-----------|-----------------------|
| **Address:** | 27 SAINT HELENS GARDENS LONDON UNITED KINGDOM W10 6LN |
| **Class of share:** | ORDINARY |
| **Number of shares:** | 1 |
| **Currency:** | GBP |
| **Nominal value of each share:** | 1.00 |
| **Amount unpaid:** | 0.00 |
| **Amount paid:** | 1.00 |
Statement of Compliance
I confirm the requirements of the Companies Act 2006 as to registration have been complied with.
Name: ROBERT ANTHONY HERMAN
Authenticated: YES
Authorisation
Authoriser Designation: subscriber
Authenticated: Yes
The Companies Act 2006
PRIVATE COMPANY LIMITED BY SHARES
MEMORANDUM OF ASSOCIATION OF
STINK DIGITAL LIMITED
Each subscriber to this memorandum of association wishes to form a company under the Companies Act 2006 and agrees to become a member of the company and to take at least one share each.
Name of each subscriber
Robert Anthony Herman
Dated: 1 February 2010
|
<urn:uuid:d9eab9ab-a3e7-4086-a0b0-ddb41d64f4e4>
|
CC-MAIN-2019-43
|
https://s3.eu-west-2.amazonaws.com/document-api-images-live.ch.gov.uk/docs/y2naRN-mMgVqwpRdkkI2pSdm06CueVe1VYDTRSel0xY/application-pdf?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=ASIAWRGBDBV3OPOQBJTZ%2F20191019%2Feu-west-2%2Fs3%2Faws4_request&X-Amz-Date=20191019T184334Z&X-Amz-Expires=60&X-Amz-Security-Token=AgoJb3JpZ2luX2VjEK%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCWV1LXdlc3QtMiJHMEUCIACXjPJWwbpLJOsbHAaJqbFArqYpSXAT3VN4Cgr36UwQAiEAvmfQUGWKGAOeOULaOC0wzmBaq6%2BEsS5mouyANMhJB8Uq4wMIqP%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARACGgw0NDkyMjkwMzI4MjIiDLL5TLCcDIY53Leydyq3AzTzbNtqHCq7OBkY08fHsMfKbC1fs4wujXaGmuURqLzf7lo4YoEfVzmausd0ATR%2Bv%2BWZvSDHkbkF2UCtd%2FXAShfju5%2BjecyEZUMJlW22LO%2BcuRRdznuvMnn0Q2znuCulNMHKMOwGjbUbLh4RqLm7I%2Fb5%2FwUGt6vLBqCU4QLVsiJUU3lt7AFEjByPbWLYJC5x8zfCFyeNbs5NZq04PDG%2BqsuWf5hgT3%2B7dJ10AujvB%2BR75aySv43auk0F7srFu%2BL72yvjVUdMrvuPkAGS%2BTjzYx46LMhTKAVFOsMy20IP2LBUOGJ50mpnv10K5D7cut3UOAXZwHeAQZR6vcX2cKbJh%2FaXdMA79QBszrYyCYQH7Ovt04c7%2Fdsjm3Mh2g5PVjlAJLWIHzH%2Bton00JFBofzL8wZs5EzskIoC0wVkFoEzI69GF%2FJT8LokAvc%2FRJFjt%2FjeefR8Yzj%2Bwry2GVR17Fgd01q0SiLwIFWUYQH2iEpP6JlM4m6P9RiHr%2Fa8xeFld2gLaYwYcXuLecgzLTSRC9XefRQk5exvm61ihbkyiqMegYPfvLHyyYrGV8IhhUs4%2Fd0SDK6ZCRjXavIwwrms7QU6tAHupz78Rt%2BQIBdITB2cWW2ztCwcnoqnPheBOBjDDeT4et01o8ZAQ2IE4AfqRvhXHID8xy%2BCdqeNJrX6D1R7o30vKU%2FXhfrxEeWlgqdRrgDfm3HNelenhjVBLTYbeRzaIa3sq7sSyR0IQsnnpCSE28GCf4N2Rh309By6yP2EAK4A%2BWh8GJtcwzw5dq4YtO41ZTAXkcP9ak1CR90i90QozkhH4tbGfzdKTNO1Ep52thV0jfL2qoU%3D&X-Amz-SignedHeaders=host&X-Amz-Signature=3f9e9bb8e92173da31f6defa874d9b4ea1479e109033eee6f85b841e917a9374
|
2019-10-19T18:43:34Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986697439.41/warc/CC-MAIN-20191019164943-20191019192443-00359.warc.gz
| 683,370,065
| 797
|
eng_Latn
|
eng_Latn
| 0.719147
|
eng_Latn
| 0.822839
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
610,
911,
1254,
1606,
2146,
2487,
2728,
3099
] |
Making Sense of Democracy in Africa: How It All Began and Where It Is Going
Patrick Chabal
Two events in the nineties focused attention on the beginnings of democratisation in Africa. The first was the arrest on Christmas day 1997 of Kenneth Kaunda, the founding father of present-day Zambia and its president until 1991. Kaunda, one of the best known African politicians was later detained for his alleged involvement in a half-hearted (if not farcical) and failed coup attempt by junior officers in October 1997. The second was the predictable re-election, in January 1998, of Daniel arap Moi to Kenya's presidency - a post he had occupied for nineteen years following a campaign and elections claimed by the opposition to have made free and fair political competition impossible.
These two cases are significant because they highlight the outcome of two diverging political transitions in contemporary Africa. Zambia was one of the first African countries in which multi-party elections led to the end of one-party rule and the replacement of the incumbent leader. Indeed, Frederick Chiluba's massive electoral victory and the smooth transition to the post-Kaunda regime were hailed at the time (1991) as vindication for the view that democracy could take root in Africa. Kenya, on the other hand, exemplified a process of blocked political reform in which the determination of the President to hold onto power and the division of the political opposition combined to prevent regime change - regime change that eventually came with great difficulty.
What happened in Zambia and Kenya was also important because it raised the question of whether democracy in Africa was being consolidated or dissipated. The experience of Kenya seemed to indicate that where a regime wants to prevent democratic change it can find the means to do so. The re-election of Chiluba in Zambia appeared to indicate that democratically elected leaders are no less prone than their predecessors to seek to stay in office by what many have described as the widespread abuse of power. Does this mean that democracy is unlikely to survive on the African continent? Or is it merely an indication that democratisation is likely to be more difficult and protracted than many predicted?
This lecture attempts to cast a fresh look on these questions by concentrating attention on the conceptual and analytical framework of some of the debates. The point here is not to discuss in detail the experience of the African countries in which multi-party elections have taken place (Buijtenhuijs & Rijnierse 1993; Buijtenhuijs & Thiriot 1995). Rather it is to draw attention to the assumptions, validity and limits of current interpretations. My aim is to review the main arguments in support of, or against, the view that the present political transitions in Africa are favourable to greater democratisation. Enough time has now elapsed since the first multi-party elections (in 1989/1990) to re-consider whether they did indeed mark a watershed in the political evolution of the continent.
There has undeniably been in Black Africa a very widespread and significant change in the nature of the political regimes in place. In the years 1989-1994, most African countries moved away from single-party political systems. Multi-party elections were held, some of which resulted in the incumbent governments and leaders relinquishing power in a peaceful political transition. By 1994, it was estimated that democratic transitions had taken place in sixteen countries while flawed transitions had occurred in another twelve. Transitions had been blocked or impossible in only fourteen countries (Bratton & de Walle 1997: 120). Since 1994, some African countries have held their second, and even third, multi-party elections and in some instances (Ghana, Benin, Cape Verde, São Tomé e Príncipe, etc.) these elections have seen the return to power of the leaders and/or regimes parties previously defeated at the polls.
Although on such evidence it appears that democracy is consolidating in Africa, there are also indications that the process of democratisation, such as it may be, is fraying at the edges. There is, firstly, the persistent claim that multi-party elections are controlled and distorted, when not rigged, by incumbent regimes. There is, secondly the nagging doubt that democratically elected regimes have every intention of subverting the momentum for political liberalisation by ruling much as the previous oneparty regimes did. Thirdly, there are very obvious limits to the actual democratic nature of functioning multi-party systems, chief of which seems the inescapable conclusion that such systems have little place for political opposition. Finally, and most ominously, there is the inescapable fact that where multi-party elections have failed to bring about genuine improvements, Africans have begun to lose faith in "democracy". 1
There is, in short, some indication that what has all too readily been interpreted as a systemic political change in the direction of greater democratisation may well turn out to be no more than a surface phenomenon - undoubtedly a transition, but not necessarily democratisation, at least not in the sense in which it has usually been understood in the West. Whether this relatively gloomy view of the relative successful introduction of multi-party politics in Africa is justified or not, it behoves us to take seriously the possibility that Africa's present political transitions may not lead to the establishment of a Western-style democracy on the continent.
I propose here to review the analytical significance of the debates about the political liberalisation of contemporary Africa by looking respectively at the roots, meanings, and limits of democratisation.
(i) The roots of democratisation
The main debate here is clearly between those who contend that political liberalisation has been driven primarily by internal political dynamics and those who argue that it is essentially the outcome of external factors. The debate is significant, not because it is in and of itself important to adjudicate between internal and external factors, but because the relevance of our political analysis of contemporary Africa undoubtedly hinges on the sharpness of our understanding of the nature of political causality in those transitions.
Those who have stressed the primacy of internal factors have highlighted five main factors: (1) the erosion in the legitimacy of the one-party state; (2) the decline in all aspects of state capacity; (3) the failure of development; (4) the depth of the economic crisis; and (5) the strength of political protest and/or pro-democracy movements.
There is little doubt about the political deficiencies of post-colonial African governments, nor is there much uncertainty about the desire among most
1 In some instances they appear ready to support or condone the return of unconstitutional regime changes (e.g., coups) which, typically, promise to reduce corruption and inequalities.
Africans for more efficient and accountable governments. Beyond these general statements, however, the situation is rather more complex than at first appears. What is clear is that the roots of Africa's problems very largely lie in the failings of its economies.
It is common to argue that Africa's present predicament is primarily the result of its dependent position in the world economy. In truth, however, it is now plain that one-party states were singularly inept in managing their post-colonial economic inheritance. For reasons which cannot be discussed here in detail, most African governments were unable to establish the minimum productive basis required for the economic well-being (and sometimes even the survival) of their country.
Some countries were economically better endowed than others. Some governments were better at managing the economy than others. But in the end, following the global economic crisis triggered by the first oil crisis in the seventies, most African countries suffered grievously. Within a decade, production had declined, export earnings had collapsed, debt had soared and so had food aid requirements. Even economically successful countries like Nigeria, Côte d'Ivoire and Kenya found themselves seriously indebted and in deep economic crisis. Poorer countries were reduced to surviving on foreign aid.
Because in the first fifteen years of independence (1960-75) African economies had been relatively prosperous, the claims made by one-party states to be well suited to the twin task of national integration and development appeared to have some validity. With the economic crisis, the weaknesses of these African political systems were soon exposed. As resources dwindled, states were less and less able to fulfil their neopatrimonial functions - either in providing employment or in enabling state resources to be distributed by patrons to their clients (Bratton & de Walle 1997).
As discontent grew, African regimes became more repressive. Repression, however, was politically costly - not just because it engendered an ever rising cycle of political violence but also because it diverted state resources from more productive activities. Without doubt the decade of the eighties was one of enhanced coercion and violence in Africa. Opposition to the regimes in place increased, as did the desire for more political accountability and greater respect for human rights.
The present African crisis, therefore, has its origins in the wholesale collapse of this neo-patrimonial system. Governments have sought to maintain themselves in power by sheer force. It is these excesses, and the unfolding decline of African economies, which have prompted greater political opposition and demands for better governance. The question is, nevertheless, whether this opposition favours a radically different, and more democratic, form of politics because of a coherent analysis of what has gone wrong and a proper political programme of reform or whether it would merely like to see a return to a more efficiently functioning neopatrimonial system in which they would have a stake.
Of course, there is a large number of Africans who profess to reject the neo-patrimonial logic and who argue in favour of democracy. Many intellectuals, writers, lawyers, journalists, academics, and businessmen are well aware that the neo-patrimonial political order cannot deliver the economic growth the continent so desperately needs. They know that the defence of the status quo is not much more than a smokescreen for those who seek to avoid responsibility for their misdeeds while desperately clinging on to power. It is they who have been at the forefront of political opposition and many have paid dearly for it (Soyinka 1996).
It is debatable, however, whether internal opposition to African regimes would have led to a move towards multi-party liberalisation in the absence of the external factors discussed below. Until the demise of communism, the model of opposition was more in tune with Rawlings' Ghana or even Sankara's Burkina Faso - that is, strong, mobilising, one-party states and "left-wing" regimes - than with the multiparty parliamentary regimes which have been readily advocated in the past few years. As for popular opinion, there is no compelling evidence that it was consulted by those who took on the mantle of the opposition or that its ideas of political reform fitted the type of multi-party system which is now the norm. 2
Unsurprisingly, therefore, our conclusion must be that the root cause of political liberalisation in Africa cannot be thought to lie exclusively in the internal dynamics of these countries. 3 Although popular dissatisfaction
2 There is considerable evidence that many ordinary Africans remain unconvinced by the merits of multi-party systems. Many do not understand the meaning of democracy, so surveys such as the Afrobarometer must be taken cautiously.
3 Bratton & de Walle argue emphatically that democratic transitions in Africa are to be explained primarily in terms of the evolution of domestic politics; they view external factors merely as the context within which internal change took place.
with existing regimes had been high in most African countries for at least a decade, it is impossible to state with any conviction that such opposition would have resulted in a transition to multiparty politics without the very specific combination of outside factors triggered by the change in the post1989 world system.
This is emphatically not to say either that there is not in Africa a very strong desire for more accountable governments or that, where it is historically feasible, a democratic political system is not intrinsically desirable. It is merely to point to what I believe to be more realistic assumptions about the links between internal political processes in Africa and the outbreak of multi-party regimes on the continent.
Those pointing to the causal weight of external factors emphasise three aspects: (1) a more conservative outlook on North-South relations in the West: (2) the widespread imposition of structural adjustment programmes and (3) the post-1989 collapse of communism and the end of the Cold War.
The more conservative political atmosphere in the West (symbolised by the Reagan and Thatcher administrations) led to a foreign policy agenda where aid to Africa became a lower priority and support for one-party states diminished. The West became more critical of the failings of African regimes and of their repressive excesses. Sympathetic observers found it more difficult to defend the actions of African government to Western domestic opinion. In short, the West lost patience with the "excuses" given by African rulers (or their supporters) to explain the ruin of their policies. Since one-party political systems and state-directed development had failed, time had now come for political and economic liberalisation.
Secondly, the deepening economic crisis in Africa forced African governments to seek more and more aid. As debt grew the West began to impose tighter and tighter conditionalities. Countries wanting aid were compelled to adopt structural adjustment programmes. 4 Soon, the rescheduling of debt and even bilateral financial aid were tied to structural
4 This is not the place to discuss the merit of structural adjustment. Indeed, one can scarcely do so in the abstract since its value is best adjudged in the concrete effects it had in specific countries and not in its putative theoretical excellence. Broadly, however, structural adjustment sought: (1) to remove the impediments to the operation of the free market (e.g., subsidies or monopolies); (2) to reduce state expenditures, particularly the cost of the civil service; (3) to reduce inflation and stabilise the currency at a realistic level; (4) to spur the production of export crops or other foreign exchange earners.
adjustment. Whether structural adjustment could ever have the economic effects anticipated by the World Bank, what is clear is that it was in practice linked to political liberalisation. Indeed, some would argue that the World Bank's hidden agenda is political. Certainly, it cannot merely be a coincidence that in so many countries democratisation followed structural adjustment.
The third external factor which has influenced political change in Africa is the demise of communism in the Soviet Union and Eastern Europe. The effects have been twofold. First, Gorbachev's foreign policy reforms and the collapse of the Soviet Union as a superpower have meant that support for its erstwhile allies diminished and that Moscow applied pressure for the resolution of the conflicts to which it was party (e.g., Afghanistan, Angola). The Soviet Union also greatly reduced, when it did not cut altogether, financial or economic aid. Countries like Angola and Mozambique which relied on the Soviet bloc were now left to seek support from the West. Since the end of a bipolar world resulted in Western supremacy, pressure to institute in Africa political reforms along Western democratic lines became well-nigh unstoppable.
Another consequence of the downfall of communism has been a collapse in the legitimacy of socialism as a workable, or even desirable, political programme. Consequently, there has been pressure from the West to do away with all manner of "socialist" or "socialisant" policies in Africa. Since it was commonly believed in the West that socialism was responsible for the advent of one-party politics in Africa, there was thus a further reason for demanding democratic reforms.
The immediate effect on Africa of the post-1989 situation was to make it clear to all African governments that the West now dictated the economic and political agenda for the continent. In the context of the late eighties and early nineties that agenda consisted of a systematic programme of economic and political liberalisation. Political conditionalities became the order of the day. No longer was it possible to sustain the argument, fashioned out of the dominant social and economic theories of the sixties, that development would in due course induce democratisation. Democracy was now seen as a condition of, a pre-requisite to, development.
In summary, then, a review of the evidence suggests, as always seemed likely, that the transition towards multi-party political systems in Africa was the outcome of a singular combination of internal and external factors. 5 However, there is today every prospect that China's investment in Africa will also influence the political development of the countries with which it is most closely linked and this is likely to affect the nature of democratisation in the years to come in ways which we cannot fathom today.
(ii) The meanings of democratisation
Whatever the roots of political transitions in Africa, there has been much confusion about the precise meaning of democratisation. This confusion is more than definitional; it is normative and ideological. It is at heart a debate both about the nature of power in Africa and about the possible political trajectories of African countries in the years to come.
The analysis of the recent political evolution of Africa has hitherto largely focused on the modalities of the democratic transition. Indeed, it has often been narrowed down to a discussion about elections. While it is true that elections are at the core of democratic politics, there must be some danger that the obsession with voting will obscure the processes of political change (or, indeed, continuity) which are likely to determine the fate of democracy in Africa.
So what form(s) has democracy taken in Africa? The evidence of political liberalisation is threefold: (1) the end of the one-party political system; (2) the advent of political competition; and (3) the holding of free and universal multi-party elections.
Multi-party elections have now taken place in most African countries. In some - like Cape Verde, Benin, São Tomé e Príncipe and Zambia - the incumbent government and president were swept aside. In others - like Ghana, Côte d'Ivoire, Angola, Cameroon -, they were re-elected. In many like Guinea, Ethiopia, Kenya, Rwanda - there have been accusations of irregularities, intimidation, rigging and violence. Undoubtedly, the sight of Kenneth Kaunda humbled by his erstwhile trade unionist opponent must have comforted those who believe in democracy. Conversely, however, the ability of Paul Biya to manipulate the electoral process must have chilled
5 In this respect, I think time will show that the Bratton & de Walle argument on the causal relation between domestic political protest and political liberalisation - statistically sound as it may be - to have been overly dismissive of the key external factors which I have mentioned.
those Africans who saw in multi-party elections a means of bringing politicians to heel.
Political analysts, however, must go beyond the immediate events now taking place in Africa and ask a more fundamental question: do multi-party elections mean democratisation? In other words, are the elections currently being held in Africa an indication that democracy is becoming more entrenched on the continent?
To ask that question is in effect to ask what democracy is. I do not propose here to attempt to give "a" single, and necessarily prescriptive, definition but rather to come to the question from a variety of angles. There are a number of possible approaches but I will focus here on the four most common: the instrumental, the institutional, the cultural and the historical.
The instrumental approach, often the one that dominates the debate, concentrates on the practical means - the procedure - by which a democratic political order is established. The emphasis here is on two fundamental aspects of formal democracy (as it is understood in the West): the mechanisms for political change and elections.
The first refers to the legal and constitutional framework, which ensures that elected governments govern and defeated governments leave office. This includes the terms and length of political mandates, the conditions under which elections are held and their results implemented. Above all, it concerns the mechanisms to be instituted in order to ensure the regularity of political change (both in government and the presidency) by means of recognisably valid elections.
The second is seen as the key to the establishment of the democratic political order. The conditions for freely contested elections must be put in place. There must be unimpeded party electoral competition (e.g., registration of parties, free speech, right of assembly, and fair financing of electoral campaigns). There needs to be agreement on the modalities for the registration of all eligible voters, the establishment of an independent electoral commission and for the organisation of the elections themselves. Most importantly, the elections must be seen to be free and fair. Finally, the result of the elections must be accepted by all and immediately executed.
Those who focus on this aspect argue, rightly, that without proper procedures there can be no political liberalisation and that the practice of regular elections establishes precedents for the deepening of democracy.
Nevertheless, the emphasis on procedural matters can easily make us forget that multi-party elections in and of themselves cannot guarantee a transition to democracy, let alone the survival of a democratic political order. 6 The criticism of the Chiluba regime in Zambia suggested that such elections may simply have been the means by which one single-party state replaced another. If this is the case, then, clearly, the transition to democracy requires more than the holding of regular multi-party elections.
An institutional approach focuses less on procedure than on the systemic relationships between the recognisable constituent bodies of the political order. At the apex of the institutional framework stand the constitution and the legal system. Without a democratic constitution and a politically independent judiciary to uphold it, there can be no stable democracy. Beyond this, there must be three institutional mechanisms at work: (1) a structure of representation, (2) a working parliament; and (3) an effective system of direct political accountability.
The first is perhaps the most complicated in Africa. Indeed, formal democratic theory would stress the need for individual representation. However, for reasons having to do with the importance of communal, racial, regional, ethnic and religious forms of identity, any system of representation in Africa operates within a collective rather than individual context. By which I mean, either that representatives are chosen for reasons having to do with their communal affiliations or that elections are interpreted on particularistic grounds (Chabal & Daloz 1999).
Of course, it is true that in all countries, representatives are selected partly on ascriptive grounds. Yet, the democratic order cannot function properly (in Africa or elsewhere) unless it is accepted that, once elected, representatives balance the interests of their constituencies with those of the country as a whole. The notion, common in Africa, that the representative is elected for the sole purpose of furthering the interests of those who elected him/her is inimical to the democratic order as we know it in the West. Even if in the West too, there is a lot of evidence that clientelism matters.
The need to have a working parliament (even in presidential systems) cannot be over-estimated - indeed, it is the hallmark of Western democracy.
6 As, to be fair, Bratton & de Walle do recognise.
By working parliament, I mean an assembly which is in session most of the year and in which it is possible for the party having lost the election to operate as a viable opposition. Unless there is parliamentary scrutiny by a genuine opposition given the means to do its job, any elected assembly runs the risk of becoming a mere rubber stamp of executive authority - as generally remains the case in Africa.
A working parliament must also possess the power to enforce direct political accountability on the government. This means not just that the government must answer to parliament but that parliament is endowed with the constitutional right to dismiss the government from office through a vote of no confidence. This has yet to happen in Africa and there is some scepticism about the likelihood of governments on the continent accepting the full implications of such a democratic form of accountability. Finally, and subject to the usual caveats, a working parliament should be able to amend the constitution.
The cultural approach considers the political culture that favours and sustains democracy. This is a difficult topic for two reasons. First, since most present day democracies are Western, emphasis on such cultural attributes necessarily means painting a Western image of democracy. Second, insofar as political cultures vary in different parts of the world, such focus on Western political "virtues" may implicitly be perceived as unwarranted criticism by non-Western peoples.
Nevertheless, if one is to consider the transition to a democratic system institutionally akin to the Western, it will be impossible to avoid discussion of its cultural dimensions. Theorists of political culture emphasise the following democratic attributes: (1) a democratic ethos; (2) a mechanism for representation; and (3) a notion of accountability.
The first, though somewhat vague, refers to a political culture in which the rulers and the ruled are in accord over both the desirability and efficacy of a democratic political system. This is a taller order than may at first appear. In countries with no democratic traditions (or traditions of democratic failures 7 ) there are no intrinsic or historical reasons for trusting the democratic system to deliver a way out of a political or economic crisis - in
7 It is well to remember here that most African countries started independent life with a democratic constitutional order - the dissolution of which is now part of their political history.
Africa or elsewhere. Witness the difficulties in the political transition of Russia and a number of Eastern European countries such as, for example, the former Yugoslavia, Albania, Romania and Bulgaria.
Furthermore, a democratic ethos means a political culture in which individuals trust the mechanics of the democratic system of representation. Democracy rests on an accepted notion of the political supremacy of the individual citizen qua political agent. In other words, a culture of representation pre-supposes that rulers and ruled alike accept the political primacy of individual representation expressed by means of a single, secret and discrete vote. Here too, there are serious difficulties in countries where cultural traditions are not congruent with such notions of individual representation (Chabal 2009).
But all this is nothing without a political culture in which there is a widespread acceptance of democratic norms of accountability. Although it is often argued that democratic accountability is enforced by means of multi-party elections, the truth is that such is only the case in countries where political accountability is democratic in the first instance. The one pre-supposes the other. More, the one can only derive from the other. Elections are only meaningful as a method of accountability where they are recognised to embody the legitimate political will of individual citizens which is far from being straightforwardly the case in contemporary Africa. 8
Political accountability is the mechanism by which the rulers are made to account to the ruled for their political actions. This has taken many different forms over the course of human history. For instance, pre-colonial Africa had very specific means by which chiefs were held accountable. When the rains failed some might be put to death. Democratic accountability, on the other hand, is much more specific (and perhaps less lethal!) in that it is almost entirely tied to the electoral process. However, since the African post-colonial political order does not formally recognise "traditional" forms of political accountability, failures of democratic accountability are dangerous. Any deficiency in the quality of elections or the operation of the parliamentary system invalidates democratic accountability, leaving a void at the centre of the political order.
8 The failure to recognise this problem is one of the central weaknesses in the argument presented by Bratton & de Walle.
There is, finally, an historical approach to the question of political transitions in Africa. Democracy as we know it in the West today is not a system which appeared sui generis at a certain point in the history of mankind to bestow on a certain group of people the bounties of an inherently superior political method. Western countries are democratic not because some new regime abruptly and arbitrarily put in place the instruments of a democratic order. They are democratic because democracy is the political order which emerged from several centuries of economic and political change as the most effective and legitimate system of political accountability.
In other words, democracy is the end result of a long and complex political process and not the outcome of conscious policy decisions taken at a particular point in time to establish "a better" political order. Although it is true that democracy is a system with a well-defined and well-regulated constitutional, legal, procedural and institutional framework, it cannot be stressed enough that what makes it work is less such a framework than the general consensus within society about the legitimacy and efficacy of the democratic political system.
For this reason, I think it might be fruitful to approach the question of democracy from the comparative perspective of the historical evolution of Western and African polities. Here we might remind ourselves (1) that the birth of Western democracy was both protracted and violent; (2) that the emergence of democracy was underpinned by the development of an uniquely dynamic and productive economic system - capitalism; and (3) that the effective functioning of democracy rests on the widest possible agreement about the legitimacy of the relationship between individual representation and parliamentary political accountability.
Democracy is thus an eminently fragile political system. Where consensus dissolves or where the economic basis of democracy withers, the whole political order is in jeopardy and may collapse (as it did in Germany in the 1930s). As is obvious, Africa has never enjoyed the economic strength and political stability which, in Europe, made possible the emergence of democracy. The continent has perennially suffered an acute economic and political crisis. Under such conditions, then, it might well be asked whether multi-party elections in Africa are likely to result in viable democracies on the Western model.
Unfortunately, the very real possibility that present political transitions will fail to bring about greater political accountability could have serious practical consequences. The most immediate danger is that disillusionment and cynicism will lead to the dilution of the legitimacy of the democratic aspiration. If multi-partyism brings few benefits to the mass of the population, if it is merely the sham which enables deeply compromised and unpopular regimes to stay in place, now with a new democratic legitimacy and with outside financial support, then it is to be feared that Africans might well give up on democracy altogether. Political analysts must thus be prepared to consider what the limits of the present transitions in Africa might imply.
(iii) The limits of democratisation
The debate here turns on the extent to which the recent political transitions have been sufficiently institutionalised to provide a viable political platform for overcoming the crisis in which most African countries still find themselves. In other words, is democratisation as it is presently to be found in Africa a political framework for the reforms which need to be implemented in order to increase political accountability and spur sustainable economic development?
On this issue there are strong views. Some analysts argue forcefully that, for all its shortcomings, the beginnings of democratisation in Africa are fundamental (Bratton & de Walle 1997), for at least two sets of reasons. First, because the opening up of the political system and the new democratic practices (competitive politics, elections, freedom of the press, etc.) have set precedents which it will be difficult to extinguish. Second, and more controversially, because these new democratic practices have altered the notion of the political "good": from now on non-democratic regimes will irrevocably lack legitimacy.
The others argue, perhaps slightly less forcefully because their message is not as palatable, that the transition to democracy is nothing of the kind. It is merely one of the many political transformations through which African countries have gone since independence. Their view is that democratisation was largely induced from outside, that it amounted to little more than flawed multi-party elections, and that the practices of the newly elected regimes have differed little from those of their predecessors. Moreover, they argue, events since the first multi-party elections have confirmed their worries - both because these ostensibly democratic governments have displayed many of the same features as single-party regimes and because they have failed to accept the rigours of the political compromises required by democracy.
This is in part a dialogue of the deaf, since each side focuses attention on different aspects of the recent political transitions. Each can rely on the evidence of what has happened in some African countries - while conveniently neglecting what has happened elsewhere. For example, it can be argued that the re-election in Benin of the old socialist leader Kérékou (at this stage, of course, a declared democrat) was a triumph of democracy. Conversely, the 2010 coup in Niger, overthrowing as it did a democratically elected president and prime minister who had conspired in bringing about a political stalemate in the country, can be adduced as proof that democracy does nothing to solve the fundamental political divisions in any particular country. In view of such events, should Zambia be seen as a pioneer in the transition to democracy or a country in which the democratically elected regime abused power so as to prevent democracy from working to its disadvantage? 9
The question is not simple and it would serve no purpose to try to approach it simplistically. Much of the argument is sterile, concerned as it is to prove a point, often for reasons which have little to do with Africa. Pitted against each other are those who want to show that the rolling tide of history is now bringing democracy to the most remote corner of the known world and those who believe that democracy (as we know it) is not possible in backward African countries. 10 Although it would be easy to point out that both arguments are a-historical and flawed, this would in no way deter their proponents, for the simple reason that their position is ideological rather than analytical.
More consequential, perhaps, is the question of whether there is, or will be, a causal relationship between the present political transitions and greater
9 Among others, President Chiluba attempted to muzzle the press. He also introduced legislation of dubious legality to make it impossible for Kenneth Kaunda to challenge him in the last presidential elections.
10 These two positions are illustrated by two notorious and influential American articles: F. Fukuyama, "The End of History" and R.D. Kaplan, "The coming anarchy: how scarcity, crime, overpopulation and disease are rapidly destroying the social fabric of our planet".
economic development in Africa. Judged by the emerging consensus on the matter - in which there is agreement between previously opposite perspectives, like those of the World Bank and the radical Nigerian social scientist Claude Ake (Ake 1996) 11 - it would appear that the question is settled. Democracy is now indeed seen as a pre-requisite to development and development is, quite naturally, taken to be the only way out of the present crisis.
A closer analysis of this consensus, however, reveals diverging premises. There are, on the one hand, those who argue that only democracy can free up the market which will drive economic growth. There are, on the other hand, those who see democracy as the only way of ensuring that the state will be able to foster the necessary development. There is one that sees democracy as a way of minimising the role of the state and maximising the role of the market. The other sees democracy as the mechanism for ensuring that the state will do what the market has hitherto failed to achieve. Here too, the debate is vitiated by the fact that both sides hold ideological positions since in practice there is to date in Africa too little evidence decisively to support either argument.
****
What is at issue here is whether a focus on democratisation is the most appropriate, or even the most useful, starting point for understanding contemporary African politics. Judged by the number of publications, it would appear that the question of democracy is paramount. Furthermore, the present consensus on the causal importance of democracy for development in Africa reinforces the notion that political analysts as well as practitioners should concentrate their efforts on this issue.
The political realities of contemporary Africa and the conceptual and ideological pitfalls which we have identified above suggest to me, however, that a focus on democratisation does not necessarily serve the analytical cause well. Whatever the meaning(s) of the present moves towards greater political liberalisation, the limits of democratisation are such as to reduce the heuristic quality of an approach to politics which
11 Claude Ake's tragic death in a plane crash was a great loss to African social science.
concentrates primarily on the so-called transition to democracy. In short, the debate about democratisation is all too often ideological, or normative.
My own approach is resolutely analytical. I have explained elsewhere why I think it more useful to focus on the question of political accountability rather than democracy when discussing contemporary African politics (Chabal 1992 & 1994). The point here is not just semantic. Democracy is a political system in which political accountability is primarily enforced through elections and parliamentary scrutiny. The reverse, however, does not necessarily apply. Elections and parliaments in and of themselves are no guarantees of a functioning system of political accountability.
If this is the case, then it is more important to ask whether there are, or are likely to be, sufficiently effective and legitimate forms of political accountability in post-colonial Africa rather than whether they are "democratic" or not. By which I mean, that it is ultimately more significant for Africans to know that their rulers are accountable to them in ways which they consider legitimate than to take part in the formal "rituals" of multi-party democracy. 12
Let me be clear here. I am not saying that elections are unimportant; merely that they are no substitute for effective political accountability. Whether elections enhance political accountability or not is less a function of how truly "multi-party" they are than of the quality of representation they bring about in the post-electoral period. Where, as in Kenya, for example, multi-party elections were long seen by the majority of the population merely as a way for the old political elites of legitimating their continued dominance of a de facto one-party system, they were not likely to contribute much to greater and more sustained political accountability. It will be interesting to see whether the recent regime change in that country does contribute to a more meaningful democratisation. More generally, it will be imperative to see what happens in countries when, after the elections, political opposition continues to be suppressed - as is the case in many African countries.
However difficult it may be to assess political accountability in postcolonial Africa, unless we can devise a political analysis capable of doing
12 As President Museveni of Uganda has argued with vigour.
so it will be well-nigh impossible to seriously gauge the prospects of democracy. The starting point for such an analysis must be a realistic understanding of what is actually happening politically on the continent. The conclusion of my most recent research is that a focus on multi-party political liberalisation is liable to distract us from enquiring into the deep causes of the political crisis in Africa. This is because identifying the reasons for the apparent disorder of Black Africa demands that we begin by making sense of the multifarious and complex ways in which political accountability operated in the neo-patrimonial political systems that developed everywhere in Africa after independence. 13
If, as I believe, it is not so much the absence of formal democracy but the deliquescence of the neo-patrimonial system which caused discontent in the eighties, then we should be careful not to take too normative a view of the prospects for democracy in Africa. The development of political systems endowed with greater political accountability may turn out not to follow the apparently well-worn paths of Western multi-party democratisation. The future of the continent may be less cheerful than the supporters of democratic theory believe but it may also be less bleak than the failures of formal multi-party democracy would suggest.
References
Ake, Claude. 1996. Democracy and Development in Africa. Washington D.C.: The Brookings Institution.
Chabal, Patrick. 1992 & 1994. Power in Africa: An Essay in Political Interpretation. London: Macmillan.
Chabal, Patrick. 2009. Africa: The Politics of Suffering and Smiling. London: Zed Press.
13 Africa Works provides a new paradigm for the analysis of politics in post-colonial Africa which seeks to explain the three most intractable paradoxes of Black Africa's "modernity": that is, the informalisation of politics, the apparent "re-traditionalisation" of society, and the ways in which so many can profit from apparent economic "failure".
Chabal, Patrick & Daloz, Jean-Pascal. 1999. Africa Works: Disorder as Political Instrument. Oxford: James Currey.
Bratton, Michaael and van de Walle, Nicolas. 1997. Democratic Experiments in Africa: Regime Transitions in Comparative Perspective. Cambridge: Cambridge University Press.
Buijtenhuijs, Rob & Rijnierse, Elly. 1993. Democratization in SubSaharan Africa, 1989-1992: An Overview of the Literature. Leiden: African Studies Centre.
Buijtenhuijs, Rob & Thiriot, Céline. 1995. Démocratisation en Afrique au Sud du Sahara, 1992-1995: un bilan de la littérature. Leiden: African Studies Centre and Bordeaux: CEAN.
Fukuyama, Francis. 1989. "The End of History". National Interest, 16 (Summer 1989), 3–18.
Kaplan, R. D. 1994. "The coming anarchy: how scarcity, crime, overpopulation and disease are rapidly destroying the social fabric of our planet". Atlantic Monthly (February 1994), 44–76.
Soyinka, Wole. 1996. The Open Sore of a Continent: A Personal Narrative of the Nigerian Crisis. Oxford: Oxford University Press.
World Bank. 1994. Adjustment in Africa: reforms, results and the road ahead. Washington D.C.: World Bank.
|
<urn:uuid:ca6f9e4b-a02b-494d-943e-3d720a6805ec>
|
CC-MAIN-2017-43
|
http://modernafricajournal.org/wp-content/uploads/Patrick-Chabal-Making-Sense-of-Democracy-in-Africa-How-It-All-Began-and-Where-It-Is-Going.pdf
|
2017-10-22T15:48:26Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825308.77/warc/CC-MAIN-20171022150946-20171022170946-00770.warc.gz
| 233,169,123
| 8,583
|
eng_Latn
|
eng_Latn
| 0.955992
|
eng_Latn
| 0.998665
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"dag_Latn"
] | false
|
rolmOCR
|
[
2260,
4918,
7044,
9464,
12225,
14966,
17824,
19886,
22359,
24797,
27300,
29774,
32231,
34952,
37258,
39500,
41895,
43902,
45040
] |
Contact:
Danielle Coglianese Senior Specialist, Marketing and Communications Association for the Healthcare Environment 155 N Wacker Drive, Suite 400 Chicago, IL 60606 (312) 422-3857 [email protected]
For Immediate Release
AHE Past President Appointed Director of the VA Palo Alto Health System
Chicago, August 4, 2017 - The Association for the Healthcare Environment (AHE) of the American Hospital Association (AHA) is proud to announce past President Thomas (Tony) Fitzgerald, CHESP was sworn in as the Director of the VA Palo Alto Health System (VAPAHCS). As Director, he will oversee delivery of health care to more than 93,000 Veterans spanning 11 congressional districts and 10 counties in northern California. VAPAHCS has an operating budget of $1.1 billion, over 7,000 employees and volunteers and is one of the most complex facilities in the VA system.
Fitzgerald began his VA career in 1988 as a Psychiatric Nursing Assistant at the North Chicago VA, moving on to a position as Housekeeping Aide. He went on to become the Healthcare Facilities Officer at North Chicago VA followed by Chief of Environmental Management at VAPAHCS. He held progressively more responsible positions in executive management including Assistant Director, Associate Director and Deputy Director at VAPAHCS. He also served as Interim Director at the VA Central California Health Care System in Fresno as well as at VAPAHCS.
He holds a Bachelor's Degree in Business Administration with a concentration in Healthcare Management from the American InterContinental University in Hoffman Estates, IL; is a graduate of the Leadership VA program, the Health Care Leadership Development Institute, and the VA Management Development Program. He is a lifetime member of AHE, serving as its president in 2004 and 2005; as well as the American College of Healthcare Executives. Mr. Fitzgerald is a Veteran of the U.S. Army, where he served 16 years as a medical non-commissioned officer.
"As an organization, we celebrate Tony's accomplishment and are proud to boast of his humble beginnings in environmental management services; proving hard work, strategic leadership and holding steadfast to your goals delivers results, said current AHE President Gary Dolan, CHESP.
Fitzgerald was sworn in as Director on June 28, 2017.
About AHE
The Association for the Healthcare Environment (AHE) is a personal membership group of the American Hospital Association. AHE is the professional organization of choice for professionals responsible for environmental services and caring for the patient and resident care environment across all care settings including hospitals, long-term care, continuing care retirement communities and ambulatory care. AHE is the recognized authority in environmental services; promoting the thought leadership for over 2,200 professionals working to ensure a clean and safe healthcare environment. www.ahe.org # # #
|
<urn:uuid:a4a49ab5-d840-40ce-9076-d49495700ff2>
|
CC-MAIN-2018-13
|
http://www.ahe.org/Education/Documents/News_Press_Releases/2017/Former_AHE_President_new_Director_VAPAHCS.pdf
|
2018-03-24T06:32:04Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257649931.17/warc/CC-MAIN-20180324054204-20180324074204-00619.warc.gz
| 323,267,967
| 599
|
eng_Latn
|
eng_Latn
| 0.990911
|
eng_Latn
| 0.990999
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1968,
2921
] |
MR M.SHAW
1 HORSEWELL LANE
WIGSTON
LEICESTER
LE182HQ
Tel: 0116 2121391 / 07970 061840
Email:[email protected]
Learn to play the Violin or Viola!
Dear Parent/Carer,
Following a demonstration at school recently, your child showed an interest in wanting to learn the violin or viola.
Why choose the Violin/Viola?
Learning to play the violin/viola is a challenging and rewarding experience that can be a lot of fun. It can often improve other key skills such as concentration, coordination, memory function, literacy, numeracy and general aural awareness.
Learning to read music and how to play melodies leads to a great feeling of achievement and can also increase creativity and confidence.
Once you can play the violin/viola, then participating in orchestras and smaller ensembles is available to you. With the flexibility of these instruments, there are many styles of music to be involved with, from Classical, to Folk, to Gypsy Jazz and even Rock music.
Who am I?
I My name is Mike Shaw and I am an experienced violin teacher and performer based in Leicestershire. For the last twenty years I have been teaching in primary and secondary schools across the county. Since September 2012 I became self-employed and teach in schools 5 days a week. I am also an experienced conductor currently working with one of the Leicester-Shire Music Services most advanced orchestras on a Saturday morning. I also coach several school ensembles, orchestras and string groups.
I perform regularly in various groups ranging from string quartets to theatre bands and have also led the Leicester Symphony Orchestra for several concerts and tours.
What is the difference between the Violin and Viola?
Visually there is no difference to start off with. They are taught in exactly the same way, the viola sounds lower in pitch than the violin but not as low as the cello. The only other difference is that a viola player reads music in a less common clef than a violin player.
Where can I get an instrument from?
Firstly, beware of the cheap internet deal! Sometimes Parents will order a very attractively priced instrument off the internet, these instruments are often inferior quality and some don't even come fully set up. A low quality instrument often won't stay in tune, be hard to tune and generally be harder for a beginner to learn on. If you are considering buying off the internet please consult the teacher first, providing links to the potential purchase where possible.
The most common way to start learning an instrument is to hire one. Local music shops can offer this service for a modest amount per month and some offer the option to purchase the instrument minus the rental costs already paid once you know your child is progressing and enjoying playing. More information can be found from:
ABC Music (Market Harborough) http://www.mhmusic.co.uk/ 01858 463144
Leicester-shire Schools Music Service http://leicestershiremusichub.org/hire-instrument
Please contact the service for further information on 0116 30 50 400
Timothy Batchelar is a trusted string instrument dealer based near Fosse Park. If you are considering buying an instrument then you can contact him on 0116 2899798 or http://www.batchelar.com/
How much will lessons cost?
At the outset, beginners are usually grouped into 3's or 4's depending on the number of pupils starting. However, individual lessons or groups of two may be the only option in schools with limited take up.
Below is a summary of all fees.
LESSON CHARGES FOR ACADEMIC YEAR 2017-18
| GROUP SIZE | LESSON LENGTH | COST (per pupil per lesson) |
|---|---|---|
| 3 or 4 pupils | 30 minutes | £5.50 |
| 2 pupils | 30 minutes | £8.25 |
| 2 pupils | 20 minutes | £5.50 |
| Individual | 20 minutes | £11 |
Parents are advised to follow the teacher's lesson lengths and group size recommendations.
If the recommendations are not followed, progress speeds may suffer.
What to do next?
Invoices for tuition are sent directly from me via email. Once you have decided to start lessons, please contact me to confirm you wish to go ahead. I will then send you some further attachments - an agreement which will need to be signed and returned, a contact information sheet so that I have your most up to date details and finally I will send you a tuition invoice which will need to be paid prior to the start of the first lesson. Please ensure you supply a valid and regularly checked email address, adding my details to any spam filters you may have in place.
If I have seen your child, I have determined they will need a ___________size instrument. Please arrange an instrument hire from one of the music shops or the music service as mentioned above in good time before lessons commence so that your child is ready to go from the first lesson. If I haven't seen them, then when arranging to hire an instrument, take your child with you and they can be sized up for an appropriate instrument.
I look forward to teaching your child very soon.
Yours Faithfully,
Mike Shaw
|
<urn:uuid:5d1796f6-2aba-4fec-8e83-bb4c06ccd29c>
|
CC-MAIN-2017-30
|
http://stjosephs.leics.sch.uk/newsletters/letter-170710.pdf
|
2017-07-24T02:34:46Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424683.39/warc/CC-MAIN-20170724022304-20170724042304-00633.warc.gz
| 304,073,676
| 1,118
|
eng_Latn
|
eng_Latn
| 0.999112
|
eng_Latn
| 0.999102
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2822,
5040
] |
This video and all related information and materials ("materials") are owned by Carnegie Mellon University. These materials are provided on an "as-is" "as available" basis without any warranties and solely for your personal viewing and use.
You agree that Carnegie Mellon is not liable with respect to any materials received by you as a result of viewing the video, or using referenced websites, and/or for any consequences or the use by you of such materials.
By viewing, downloading, and/or using this video and related materials, you agree that you have read and agree to our terms of use (www.sei.cmu.edu/legal/).
© 2015 Carnegie Mellon University.
Copyright 2015 Carnegie Mellon University
This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.
Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense.
NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.
This material has been approved for public release and unlimited distribution except as restricted below.
This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other use. Requests for permission should be directed to the Software Engineering Institute at [email protected].
Carnegie Mellon® is registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
DM-0002328
Culture Shock: Unlocking DevOps Through Collaboration and Communication
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213
Todd Waits
Aaron Volkmann
Waterfall
- Requirements
- Design
- Implementation
- Verification
- Maintenance
Agile
Initial Planning
Planning
Requirements
Analysis & Design
Implementation
Evaluation
Deployment
Business
Research → Budget → Document
Water-
Jez Humble, https://youtu.be/L1w2_AY82WY
Dave West, http://sdtimes.com/analyst-watch-water-scrum-fall-is-the-reality-of-agile/
Business
Research → Budget → Document
Development
Water-Scrum-
Jez Humble, https://youtu.be/L1w2_AY82WY
Dave West, http://sdtimes.com/analyst-watch-water-scrum-fall-is-the-reality-of-agile/
Business
Research → Budget → Document
Development
QA & Operations
Integrate → Test → Release
Water-Scrum-Fall
Jez Humble, https://youtu.be/L1w2_AY82WY
Dave West, http://sdtimes.com/analyst-watch-water-scrum-fall-is-the-reality-of-agile/
DevOps
Business Needs Shared Goals Collaboration
DevOps Culture
No Blame
DevOps Culture
No Blame Transparency
DevOps Culture
- No Blame
- Transparency
- Reduce Waste
DevOps Culture
- No Blame
- Transparency
- Reduce Waste
- Goals and Objectives aligned with Business Needs
DevOps Culture
- No Blame
- Transparency
- Reduce Waste
- Goals and Objectives aligned with Business Needs
- Integrated Efforts
DevOps ≠ docker
DevOps ≠
CHEF™
CODE CAN
puppetlabs®
DevOps ≠ Jenkins
DevOps is People
People use tools
Jenkins, Docker, TeamCity, JIRA, CruiseControl, Chef, Ansible, FogBugz, Redgate, Puppet Labs, SaltStack, Visual Studio Team Foundation Server
Global Vision
Project Management Tools
- Issue Tracker
- Wiki
Project Team
Source Code Repository
- App Code
- Infrastructure code
- Documentation
Build → Automated Testing → Automated Deployment
Production
Customer Visibility
QA Team
Status/Feedback
ChatOps
(11:47:26 AM) TeamCity: Build successful.
PROJECT_NAME::TEST CONFIGURATION, agent WinAgent
http://teamcity.url/viewLog.html?buildId=6677&buildTypeId=bt00
ChatOps
(10:37:15 AM) Aaron: The CSS style on the navbar is not overflowing correctly. I don’t see a scroll bar.
(10:37:26 AM) Todd: Hmmm… that’s weird. Let me check the div.
(10:38:58 AM) Todd: devbot newcase “No scrollbar on navbar overflow”
(10:38:59 AM) DevBot: Case Created: 6024 “No scrollbar on navbar overflow” http://issuetracker.internal.local/default.asp?6024
(11:42:06 AM) Todd: devbot start 6024
(11:42:06 AM) DevBot: Todd working on Case 6024 http://issuetracker.internal.local/default.asp?6024
You can’t buy DevOps
• Existing team members should be part of it
• DevOps teams can create new silos
• People should continue to be experts in their fields
• Teams should have members who cross train to interface with the other side
DevOps Engineer
- Scrum Master-esque – but for tech side
- Help set up CI, CD
- Train team members
- How to convert legacy projects to new system
Shift Left
Development Environment → Test Environment → Stage Environment → Production Environment
Ops Team
Shift Left
Development Environment → Test Environment → Stage Environment → Production Environment
Ops Team
Org Structure
Director
Dev Manager
Ops Manager
Dev Dev Dev Dev
Dev Dev Dev Dev
Dev Dev Dev Dev
Dev Dev Dev Dev
Ops Ops Ops Ops
Ops Ops Ops Ops
Ops Ops Ops Ops
Ops Ops Ops Ops
Culture Change is Hard
- Support from top leadership
- Identifying and addressing obstacles to adoption
- Rely on people closest to the work for guidance
Join the new SEI DevOps Forum on LinkedIn
The SEI DevOps Forum is facilitated by the Secure Lifecycle Solutions team of the CERT Division at the Software Engineering Institute within Carnegie Mellon University. This forum will provide guidance & expertise in all things DevOps. The goal is to provide guidance on how DevOps can help your organization reach new heights of efficiency and productivity.
Group Members in Your Network
- Shane McGraw 1st
Communication Services Outreach Team Lead at Software Engineering Institute
- Hasan Yasar 2nd
Technical Manager in the CERT Program at Carnegie Mellon University’s Software Engineering Institute
- Todd Waits 2nd
Project Lead
About this Group
- Created: March 25, 2015
- Type: Professional Group
- Members: 6
- Owner: Shane McGraw
- Website: http://blog.sei.cmu.edu/archives.cfm/categ...
|
<urn:uuid:9ef5c72a-a0ef-4a17-b29a-5fbc3fcaa11a>
|
CC-MAIN-2018-09
|
https://resources.sei.cmu.edu/asset_files/Webinar/2015_018_101_442596.pdf
|
2018-02-23T18:06:33Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814827.46/warc/CC-MAIN-20180223174348-20180223194348-00542.warc.gz
| 760,967,221
| 1,551
|
eng_Latn
|
eng_Latn
| 0.655682
|
eng_Latn
| 0.934951
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"swe_Latn",
"swe_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"unknown",
"unknown",
"unknown",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"nds_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
655,
2205,
2385,
2467,
2575,
2751,
2946,
3190,
3243,
3269,
3309,
3367,
3476,
3606,
3623,
3662,
3680,
3698,
3859,
4117,
4283,
4799,
5035,
5183,
5294,
5405,
5586,
5742,
6593
] |
Available Online at www.ijpba.info
International Journal of Pharmaceutical & Biological Archives, 2013; 4(2): 375 - 378
ORIGINAL RESEARCH ARTICLE
Co-Inoculation Effect of Am Fungi and Phosphobacteria on the Growth and Yield of Rhizosphere of Bhendi (Abelmoschus esculentus L.) as Influenced by Chemicals and Biopesticides
K. Sivakumar* and P. Tholkappian
Department of Agricultural Microbiology, Faculty of Agriculture, Annamalai University, Annamalai Nagar – 608 002, Tamilnadu, India
ABSTRACT
Received 02 Jan 2013; Revised 15 Apr 2013; Accepted 25 Apr 2013
A pot culture experiment was conducted to study the Co-inoculation effect of AM fungi (Glomus fasciculatum) and phosphobacteria (Bacillus megaterium) on the growth and yield of rhizosphere of bhendi (var. Arka anamika) as influenced by chemical and bio pesticides. The insecticide Tracer 240SC was applied at different concentration viz., 100 ml, 200 ml and 300 ml ha -1 and biopesticides Neem oil was applied @ 500 ml, 750 ml and 1000 ml ha -1 . All the three different concentration of biopesticides significantly increased the root colonization percentage, spore numbers, phosphobacterial population, plant height, plant dry weight and fruit yield when compared to the control. When insecticides were applied, it drastically suppressed all above growth and yield parameters. The study revealed that foliar application of Neem oil @ 1000 ml ha -1 is safer to Mycorrhizal development, phosphobacterial population, growth and yield of bhendi than the use of chemical insecticides.
Key words: Glomus fasciculatum, Bacillus megaterium, Arka anamika and Insecticides.
In India, the farmers regularly use more amounts of chemical fertilizers and pesticides for crop production especially for vegetable crops, thus the soil which leads to soil pollution and ground water contamination, ultimately causing health hazards [1]. In order to avoid the environmental pollution especially soil pollution, most of the scientists are recommending the use of biofertilizers along with biopesticides in a sustainable manner to maintain the soil health and also the productivity.
1. INTRODUCTION
infected ones. These fungal associations are beneficial to crop plants in many ways, including enhancing the nutrient availability especially phosphorus, enhancing water uptake, inducing resistant against diseases and increasing the yield [2].
Bhendi (Abelmoschus esculentus L.) or ladies finger is an important vegetable of the tropical countries and most popular in India, Nigeria, Pakistan, Cameroon, Iraq and Ghana. Though, it is virtually not grown in Europe and North America, yet, lot of people in these countries have started liking this vegetable because of good amount of vitamin A and folic acid, besides carbohydrates, phosphorus, magnesium and potassium.
AM fungi is the most abundant kind of mycorrhizae found in association with every taxonomic group of plants and the list of species not infected is probably far shorter than the
Phosphorus solublizing biofertilizers are carrier based preparations containing living cells of microbes like bacteria, fungi and actinomycetes which may help in increasing crop productivity by way of helping in solubilization of insoluble phosphorus, stimulating plant growth by providing hormones, vitamins and other promoting substances.
2. MATERIALS AND METHODS
Isolation and screening of AM fungi and Phosphobacteria
Bhendi rhizosphere soil sample were collected from twenty different locations in Cuddalore District of Tamilnadu. Four different AM fungal species viz., Glomus fasciculatum, Glomus mosseae, Gigaspora margarita and Acaulospora
*Corresponding Author: K. Sivakumar,E. mail: [email protected]
laevis were isolated, characterized and identified under stereozoom microscope according to Gerdemann and Trappe [3] .
Isolated AM fungi are screened for the efficiency by root colonization percentage, AM fungal spore numbers, acid phosphatase and alkaline phosphatase activity in soil. All the four AM fungal species colonized the roots of bhendi. However, the degree of root infection and colonization varied considerably between them. The response of bhendi in terms of root colonization by AM fungi was the highest with Glomus fasciculatum followed by Glomus mosseae, Gigaspora margarita and Acaulospora laevis in soils. Acid phosphatase and alkaline phosphatase activities were also the highest in Glomus fasciculatum.
Twenty phosphobacterial isolates were screened for Phosphate solubilizing efficiency, producing potential of Indole acetic acid (IAA) and Gibberellic acid (GA3 ) and Siderophore. Among twenty isolates, Bacillus megatherium was found to be the most efficient isolate in solubilizing various insoluble phosphates. Based on the above screening tests, the isolates Glomus fasciculatum and Bacillus megaterium were found to be most efficient strains and selected for further studies.
A pot culture experiment was conducted to find out the compatibility and toxicity of chemical insecticide and biopesticide on the growth and yield of bhendi inoculated with Glomus fasciculatum and Bacillus megaterium by spraying chemical insecticide and biopesticide viz., Tracer 240 SC and Neem oil on 40 DAS at various concentrations. Earthen pots of 30 cm diameter were filled with garden land soil @ 8 kg pot -1 collected from experimental farm, Annamalai University (soil pH 7.3, available N 195 kg ha -1 and available phosphorus 16.5 kg ha -1 ). The recommended dose of nitrogen, phosphorus and potash were applied as urea (100 kg N kg ha -1 ), single super phosphate (50 kg P kg ha -1 ) and muriate of potash (50 kg K kg ha -1 ) respectively. Seven treatments were tried with inoculation in which unsprayed served as control and three replications were maintained for each treatment under randomized block design.
Treatment details
+
T1
: Control
T : 2 Tracer 240SC 100 ml ha
-1
G. fasciculatum + B. megatherium
© 2010, IJPBA. All Rights Reserved.
T : 3 Tracer 240SC 200 ml ha -1 + G. fasciculatum + B. megatherium -1
T:
4
Tracer 240SC 300 ml ha
T : 5 Neem oil 500 ml + G. fasciculatum + B.
+G.
fasciculatum + B. megatherium
megatherium
T : 6 Neem oil 750 ml + G. fasciculatum + B. megatherium
T : 7 Neem oil 1000 ml + G. fasciculatum + B. megatherium
AM fungal colonization in bhendi roots
The percentage mycorrhizal colonization of the roots was determined by the method of Phillips and Hayman [4] .
The roots were washed gently in tap water. The washed roots were cut into one cm size and then immersed in 10 per cent KOH solution for clearing the host cytoplasm and nuclei for stain penetration. Then it was autoclaved at 15 lbs/sq. inch pressure for about 20 minutes. Then, the root bits were taken out and washed with tap water for about three times or until no brown colour appeared in the rinsed water. The roots were acidified with two per cent hydrochloric acid (3 4 minutes) for proper staining. The acid was poured off without rinsing with water and root bits were stained with 0.05 per cent tryphan blue in lactophenol solution and boiled for 10 minutes.
These root bits were examined under compound microscope. Fifty root segments in each replication were used to determine AM fungal colonization per cent. 𝐏𝐏𝐏𝐏𝐏𝐏 𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜 𝐫𝐫𝐫𝐫𝐫𝐫𝐫𝐫 𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜
Survey for the occurrence of AM fungal spores
𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜𝐜 = 𝐍 𝐍 𝐍 𝐍 𝐍 𝐍 𝐍 𝐍 𝐍 𝐍 𝐍 𝐍 𝐨 𝐨 𝐨 𝐨 𝐫 𝐫 𝐫 𝐫 𝐫 𝐫 𝐫 𝐫 𝐛 𝐛 𝐛 𝐛 𝐛 𝐛 𝐛 𝐛 𝐰 𝐰 𝐰 𝐰 𝐰 𝐰 𝐰 𝐰 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐢 𝐓𝐓𝐓𝐓𝐓𝐓𝐓𝐓𝐓𝐓 𝐧𝐧𝐧𝐧𝐧𝐧𝐧𝐧𝐧𝐧𝐧𝐧 𝐨𝐨𝐨𝐨 𝐫𝐫𝐫𝐫𝐫𝐫𝐫𝐫 𝐛𝐛𝐛𝐛𝐛𝐛𝐛𝐛 𝐞𝐞𝐞𝐞𝐞𝐞𝐞𝐞𝐞𝐞𝐞𝐞𝐞𝐞𝐞𝐞 × 𝟏𝟏𝟏𝟏𝟏𝟏
AM fungal spore population was estimated by wet sieving and decanting method of Gerdemann and Nicolson [5] .
One hundred gram of rhizosphere soil samples were taken from Bhendi mixed thoroughly in one litre of tap water to settle down the heavier particles for few seconds. The suspension was decanted through a coarse soil-sieve (500 - 800 μm sieve) to remove large pieces of organic matter.
The liquid which passed through the sieve was collected separately and stirred to resuspend all particles. The suspension was decanted through a sieve fine enough to retain desired spores (38 250 μm sieves). The material retained on the sieve
was washed with a stream of water to ensure that all colloidal materials were passed through the sieve. The small amount of remaining debris were transferred to a shallow layer of water in a petridish and examined under a Stereo zoom microscope. The spore numbers from each soil sample were counted and expressed per 100 g of soil.
Phosphobacterial population
Phosphobacteria enumerated from the rhizosphere soils of different bhendi grown fields by serial dilution [6] . The soil samples were serially diluted upto 10 -4 dilution. One ml of aliquots of last dilution was plated in using Sperber's hydroxy apatite medium. The plates were incubated upto two weeks at 28±2°C. The bacterial colonies showing clear zone were enumerated and expressed as cfu g -1 of oven dry soil.
The plant height was recorded at 30, 60 and 90 DAS. The height was measured from the ground level to the tip of the growing point. The mean values were calculated and recorded in cm.
Plant height
Determination of plant dry weight
Determination of fruit yield
The plant samples were collected from each treatment and their dry weight was determined by drying the samples in hot air oven at 60°C till a constant weight was obtained.
The total numbers of matured fruits were counted at 30, 60 and 90 DAS were recorded.
3. RESULTS
Neem oil (1000 ml) sprayed bhendi plants were observed to have the maximum per cent root infection (95.56%) followed by 750 ml and 500 ml neem oil application. The least colonization was recorded (60.33%) at Tracer 240SC @ 300 ml ha -1. Neem oil increased the spore number also
The per cent root infection by inoculated bhendi, increased with the advancement age of the plants. The maximum root infection AM fungal spore and PSB population were observed at 90 DAS (Table 1).
in bhendi plants. 190, 189 and 188 spore numbers were recorded at 1000 ml, 750 ml and 500 ml of neem oil respectively. The minimum spore numbers were recorded at Tracer 240SC @ 300 ml ha -1. (129).
Spraying of chemical insecticides (Tracer 240SC @ 300 ml ha -1. ) affect the PSB population at 3.66 10 6 cfu g -1 . The maximum PSB populations were observed in neem oil (1000 ml) applied plants (8.66 x 10 6 cfu g -1 ).
(Table 2) shows more variation were observed in root colonization, AM fungal spore number and Phosphobacterial population in all treatments when insecticides were applied at a dose higher than the recommended quantity, it drastically suppressed the root colonization per cent, AM fungal spore number and phosphobacterial population as the result of toxic effect to Glomus fasciculatum and Bacillus megatherium. Neem oil increase the AM colonization and AM fungal spore number and phosphobacterial population.
The maximum plant dry weight (35.68 g plant-1) and plant height (76.30 cm) were registered in neem oil 1000 ml followed by 750 ml and 500 ml of neem oil sprayed plants. The least plant dry weight and plant height were recorded in Tracer 240SC @ 300 ml ha -1 sprayed plants. The numbers of fruits were recorded on 90 DAS in neem oil (1000 ml) sprayed plants (18.00) followed by 750 ml and 500 ml neem oil sprayed plants. The numbers of fruits were increased with decrease in the dose of insecticides application above the recommended dose. Among the two different applications, chemical insecticide significantly reduced the number of fruits than the neem oil. The insecticides show very high degree of variation towards plant height, plant dry weight and fruit yield. However, Tracer 240SC exhibited more reduction on the above characters. The least reduction was noticed in Neem oil at recommended dose @ 1000 ml ha -1 . The study revealed that foliar application of Neem oil at
Table 1: Effect of combined inoculation of G. fasciculatum and B. megaterium on the per cent root colonization, spore and PSB population and fruit yield in the rhizosphere of bhendi as influenced by chemical and bio-pesticides
| | 30DAS | 60DAS | 90DAS | 30DAS | 60DAS | 90DAS | 30DAS | 60DAS |
|---|---|---|---|---|---|---|---|---|
| T Control 1- | 69.78 | 83.29 | 91.7 | 109 | 167 | 185 | 4.33 | 6 |
| T Tracer 240SC @ 100ml ha-1 2- + G. fasciculatum+ B. megaterium | 67 | 80.15 | 88.75 | 101 | 158 | 175 | 2.33 | 3 |
| T Tracer 240SC @ 200ml ha-1 3- + G. fasciculatum+ B. megaterium | 54.84 | 72 | 75.34 | 98 | 131 | 157 | 2 | 3 |
| T Tracer 240SC @ 300ml ha-1 4- + G. fasciculatum+ B. megaterium | 38.67 | 55.76 | 60.33 | 68 | 89 | 129 | 1.66 | 2.33 |
© 2010, IJPBA. All Rights Reserved.
K Sivakumar et al. / Co-inoculation Effect of AM fungi and Phosphobacteria on the Growth and Yield of Rhizosphere of Bhendi (Abelmoschus esculentus L.) as Influenced by Chemicals and Biopesticides
| T Neem oil 500 ml ha-1 5- + G. fasciculatum+ B. megaterium | 72.56 | 84.54 | 93.65 | 110 | 169 | 188 | 4.66 | 6.00 |
|---|---|---|---|---|---|---|---|---|
| T Neem oil 750 ml ha-1 6- + G. fasciculatum+ B. megaterium | 74.14 | 85.36 | 94.02 | 112 | 170 | 189 | 5.33 | 6.66 |
| T Neem oil 1000 ml ha-1 7- + G. fasciculatum+ B. megaterium | 78.73 | 85.92 | 95.56 | 113 | 172 | 190 | 5.66 | 7 |
| S.Ed | 0.08 | 0.14 | 0.38 | 0.13 | 0.48 | 1.09 | 0.13 | 0.24 |
| CD(p=0.05) | 0.15 | 0.29 | 0.75 | 0.26 | 0.57 | 2.17 | 0.25 | 0.47 |
Table 2: Effect of combined inoculation of G. fasciculatum and B. megaterium on the plant dry weight, plant height and plant phosphorus content of bhendi as influenced by chemical and biopesticides Plant dry weight (g plant -1 Plant height (cm) ) Fruit yield (plant -1 )
| Treatments | Plant dry weight (g plant -1) | | | Plant height (cm) | | | | |
|---|---|---|---|---|---|---|---|---|
| | 30DAS | 60DAS | 90DAS | 30DAS | 60DAS | 90DAS | 30DAS | 60DAS |
| T Control 1- | 19.56 | 28.40 | 31.70 | 23.40 | 43.70 | 62.80 | 07 | 09 |
| T Tracer 240SC @ 100ml ha-1 2- + G. fasciculatum+ B. megaterium | 19.34 | 28.10 | 30.20 | 19.25 | 36.25 | 60.12 | 05 | 08 |
| T Tracer 240SC @ 200ml ha-1 3- + G. fasciculatum+ B. megaterium | 18.48 | 21.62 | 28.12 | 18.56 | 31.59 | 59.36 | 05 | 08 |
| T Tracer 240 SC@ 300ml ha-1 4- + G. fasciculatum+ B. megaterium | 12.31 | 16.41 | 20.18 | 15.23 | 28.36 | 56.69 | 03 | 07 |
| T Neem oil 500 ml ha-1 5- + G. fasciculatum+ B. megaterium | 21.85 | 31.34 | 34.45 | 24.10 | 44.30 | 63.20 | 07 | 09 |
| T Neem oil 750 ml ha-1 6- + G. fasciculatum+ B. megaterium | 22.34 | 31.98 | 35.09 | 30.00 | 52.80 | 73.40 | 09 | 11 |
| T Neem oil 1000 ml ha-1 7- + G. fasciculatum+ B. megaterium | 23.65 | 32.05 | 35.68 | 30.20 | 58.30 | 76.30 | 09 | 12 |
| S.Ed | 0.14 | 0.23 | 0.59 | 0.38 | 1.22 | 1.73 | 0.32 | 0.49 |
| CD(p=0.05) | 0.27 | 0.45 | 1.08 | 1.11 | 2.41 | 3.68 | 0.95 | 1.28 |
recommended dose is safer to mycorrhizal development, phosphobacterial population plant height, plant dry weight and fruit yield than the chemical insecticides.
(Archis hypogea L.) in zimbawe. Agric. Ecosys. Environ 110: 143-148.
4. CONCLUSIONS
In the present study, the maximum root colonization percentage, spore numbers, phosphobacterial population, growth and yield parameters were recorded maximum by the use of biopesticides, when compared with insecticides. But there was no significant difference noticed between neem oil at recommended dose @ 500 ml ha -1 and the control (unsprayed). The populations of all above organisms are strictly not significant at chemical insecticides. When insecticides were applied at a dose higher than the recommended quantity, it drastically suppressed all above parameters. The study revealed that foliar application of Neem oil at recommended dose @ 1000 ml ha -1 at recommended dose is safer to Mycorrhizal development than the chemical insecticides.
REFERENCE
1. Giannakoula, A., M. Moustakas, T. Syros and T. Yupsanis. 2010. Aluminum stress induces up-regulation of an efficient antioxidant system in the Al-tolerant maize line but not in the Al-sensitive line. Environ. Exp. Bot., 67: 487–494.
2. Lekberg, Y. and R.T. Koids. 2005. Arbuscular mycorrhizal fungi, rhizobia available P and nodulation of groundnut
© 2010, IJPBA. All Rights Reserved.
4. Phillips, J.M. and D.S. Hayman. 1970. Improved procedures for clearing roots and staining parasitic and vesiculararbuscular mycorrhizal fungi for rapid assessment of infection. Trans. Br. Mycol. Soc., 55: 158-161.
3. Gerdemann, J.W. and J.M. Trappe. 1974. The endogonaceace in the Pacific Northwest. Mycologia Mem., 5: 1076.
5. Gerdmaan, J.W. and T.H. Nicolson. 1963. Spores of mycorrhizal Endogone species, extracted from the soil by wet sieving and decanting. Trans Br. Mycol.Soc., 46:235244.
6. Sperber, J. I. 1958. Solubilization of apatite by soil microorganisms producing organic acids. Australian Agricultural Research, 9: 782-787.
|
<urn:uuid:3b3bca79-6155-45e4-a0db-9b17a3932cff>
|
CC-MAIN-2019-51
|
http://ijpba.info/ijpba/index.php/ijpba/article/download/1055/737/
|
2019-12-13T03:17:53
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2019-51/subset=warc/part-00207-f6a32f62-993d-4292-bc8d-4b816b1c87aa.c000.gz.parquet
| 69,040,208
| 5,216
|
eng_Latn
|
eng_Latn
| 0.949759
|
eng_Latn
| 0.977804
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
3716,
8208,
12707,
16896
] |
Minimum Makespan Vehicle Routing Problem with Compatibility Constraints
Miao Yu, Viswanath Nagarajan, and Siqian Shen
University of Michigan, Ann Arbor, Michigan, United States
\{miaoyu, viswa, sigian\}@umich.edu
orcid.org/0000-0002-7625-6315, 0000-0002-9514-5581, 0000-0002-2854-163X
Abstract. We study a multiple vehicle routing problem, in which a fleet of vehicles is available to serve different types of services demanded at locations. The goal is to minimize the makespan, i.e. the maximum length of any vehicle route. We formulate it as a mixed-integer linear program and propose a branch-cut-and-price algorithm. We also develop an efficient $O(\log n)$-approximation algorithm for this problem. We conduct numerical studies on Solomon’s instances with various demand distributions, network topologies, and fleet sizes. Results show that the approximation algorithm solves all the instances very efficiently and produces solutions with good practical bounds.
Keywords: vehicle routing, compatibility constraints, branch-cut-and-price, approximation algorithm
1 Introduction
Vehicle routing problems (VRPs), with a goal of finding the optimal routing assignment for a fleet of vehicles to serve demands at various locations, are classical and well studied combinatorial optimization problems. Starting from Dantzig and Ramser [7], many variants of VRPs have been considered, including VRP with time windows, Capacitated VRP, VRP with heterogeneous fleet, VRP with multiple depots, as well as hybrid versions of these variants, all of which are discussed in detail by Golden et al. [15] and Toth and Vigo [24].
In this paper, we consider a minimum makespan VRP with compatibility constraints (VRPCC). We assume that multiple types of services are demanded at various locations of a given network and each type of service can only be served by certain vehicles. The goal of the problem is to minimize the maximum traveling time of all the routes designed for fulfilling the demand, i.e., the makespan for finishing all services. The motivation of studying the minimization of makespan comes from applications that focus on balancing routing assignment for all vehicles and minimizing the time to finish serving all customers. We consider a salient application as deploying shared vehicles for serving patient medical home care service demand, distributed in a geographical network, in which we aim to balance workload of different medical staff teams dispatched
together with the vehicles. The solution methods investigated in this paper can help scheduling and routing for medical home care delivery.
We review the main VRP literature focusing on different solution methods. To exactly optimize VRPs, branch-and-cut was the dominant approach before 2000s, and the related research [see, e.g., 1, 3, 19, 20, 22] develops effective valid inequalities to improve solution efficiency. Following Fukasawa et al. [13], branch-cut-and-price (BCP) became the best performing exact solution method for (capacitated) VRP: this combines branch-and-cut with column generation. There have also been many approximation algorithms for VRPs with a minimum makespan objective [see, e.g., 4, 8, 12] that provide polynomial time algorithms with a provable performance guarantee. To the best of our knowledge, no prior work has provided either exact solution methods or efficient approximation algorithms for VRPCC.
In this paper, we develop the following algorithms for VRPCC: (i) an exact algorithm based on the BCP approach and (ii) an $O(\log n)$-approximation algorithm based on a budgeted covering approach. We provide preliminary numerical experiments for both algorithms. Our results show that the approximation algorithm solves the problem efficiently and yields a practical approximation ratio of at most two (on the test instances).
The remainder of the paper is organized as follow. In Section 2, we formally define the problem and present a mixed-integer linear programming formulation. In Sections 3 and 4, we propose a BCP algorithm and an approximation algorithm for VRPCC, respectively. In Section 5, we test our algorithms on Solomon’s instances with diverse graph sizes, vehicle fleet sizes, and demand distributions. We present the numerical results for our proposed solution methods. In Section 6, we conclude our findings and state future research.
## 2 Problem Statement and Formulation
Consider an undirected graph $G = (V, E)$, where $V = \{0, 1, \ldots, n\}$ is the set of $n + 1$ nodes. Node 0 represents the depot and set $V^+ = \{1, 2, \ldots, n\}$ corresponds to customer locations. Each edge $(i, j) \in E$, $\forall i, j \in V$ has an associated distance $d_{ij}$ satisfying the triangle inequality such that $d_{ij} \leq d_{ik} + d_{kj}$, $\forall i, k, j \in V$. A fleet $K$ of vehicles, with $K = \{1, 2, \ldots, m\}$, initially located at the depot can serve demand from customers. Each vehicle $k \in K$ can only visit a subset $V_k \subset V^+$, based on matches of vehicles and service types. In our problem, a routing decision assigns each vehicle a route such that: (a) the nodes visited by vehicle $k \in K$ are in the set $V_k$; (b) each node must be visited exactly once; and (c) the maximum distance of all assigned routes is minimized.
We define the vector $x = (x_{ij}^k, (i, j) \in E, k \in K)^T$ where $x_{ij}^k$ takes value 1 if edge $(i, j) \in E$ is used in the route for vehicle $k$, and 0 otherwise. Consider the binary parameter $u = (u_i^k, k \in K, i \in V^+)^T$ where $u_i^k$ takes value 1 if $i \in V_k$ for vehicle $k \in K$, and 0 otherwise. Let $\tau$ represent the maximum distance of all the routes. We formulate a mixed-integer program for the VRPCC as follows.
\[
\text{(MIP)} \quad \minimize_{x, \tau} \tau
\]
\[
\text{s.t.}
\begin{align*}
\sum_{j \in V^+} x_{ij}^k &= u_i^k, & i \in V^+, k \in K \\
\sum_{i \in V^+} x_{ij}^k &= u_j^k, & j \in V^+, k \in K \\
\sum_{k \in K} u_i^k &= 1, & i \in V^+ \\
\sum_{i \in V^+} d_{ij} x_{ij}^k &\leq \tau, & (i, j) \in E, k \in K \\
x_{ij}^k &\in \{0, 1\}, & (i, j) \in E, k \in K \\
u_i^k &\in \{0, 1\}, & i \in V^+, k \in K \\
\tau &\geq 0.
\end{align*}
\]
subject to \[ \sum_{(i,j) \in E} d_{ij} x_{ij}^k \leq \tau \quad \forall k \in K, \] (2)
\[ \sum_{j: (v,j) \in E} x_{vj}^k - \sum_{i: (i,v) \in E} x_{iv}^k = 0 \quad \forall v \in V, \; \forall k \in K, \] (3)
\[ \sum_{k \in K} \sum_{i: (i,j) \in E} x_{ij}^k = 1 \quad \forall j \in V^+, \] (4)
\[ \sum_{i: (i,j) \in E} x_{ij}^k \leq u_j^k \quad \forall j \in V^+, \; \forall k \in K, \] (5)
\[ \sum_{(i,j) \in E, i, j \in S} x_{ij}^k \leq |S| - 1 \quad \forall S \subset V^+, \; \forall k \in K, \] (6)
\[ x_{ij}^k \in \{0, 1\} \quad \forall (i, j) \in E, \; \forall k \in K, \] (7)
where constraints (2) ensure that \( \tau \) equals to the maximum distance of all the routes, which is minimized in the objective function (1); constraints (3) enforce flow balance at each node for routing each vehicle; constraints (4) ensure that each node is visited exactly once; constraints (5) ensure that vehicle \( k \) can only visit nodes in \( V_k \); constraints (6) are sub-tour elimination constraints.
### 3 Branch-Cut-and-Price Algorithm
We describe a BCP approach for VRPCC based on a set partition formulation where each decision variable represents a feasible route [18]. Let \( P^k \) be the set containing all feasible routes for vehicle \( k \in K \). We define the binary decision variable \( \lambda = (\lambda_p, \; p \in P^k, \; k \in K)^T \) where \( \lambda_p \) takes value 1 if route \( p \in P^k \) is used by vehicle \( k \) and 0 otherwise. Denote the binary parameter \( a = (a_{ip}, \; i \in V, \; p \in P^k, \; k \in K)^T \) where \( a_{ip} \) takes value 1 if \( p \in P^k \) visits node \( i \in V \), and 0 otherwise. We consider \( c_p \) as the cost of route \( p \in P^k, \; k \in K \). The set partition formulation is given by
\[
\text{(SP)} \quad \minimize_{\lambda, \tau} \quad \tau
\]
subject to \[ \sum_{k \in K} \sum_{p \in P^k} a_{jp} \lambda_p = 1 \quad \forall j \in V^+, \] (9)
\[ \sum_{p \in P^k} c_p \lambda_p \leq \tau \quad \forall k \in K, \] (10)
\[ \lambda_p \in \{0, 1\} \quad \forall p \in P^k, \; \forall k \in K, \] (11)
where constraints (9) enforce that each node is visited exactly once and constraints (10) enforce that \( \tau \) is the maximum cost of all routes. Due to the exponential size of \( P^k, \; k \in K \), we exploit the BCP method to solve SP.
#### 3.1 Column Generation
The idea of column generation is to maintain a subset \( \bar{P}^k \subset P^k \) for each \( k \in K \). We solve SP with \( P^k \) replaced by \( \bar{P}^k \) and detect whether any \( p \in P^k \setminus \bar{P}^K \) can
improve the solution: if yes, we add those favorable routes $p$ to $\hat{P}^k$ and repeat the process; otherwise we claim optimality. We define a restricted master problem (RMP) as linear relaxation of SP with $P^k$ replaced by $\hat{P}^k$ for all $k \in K$.
Clearly, any feasible primal solution to RMP is feasible to the linear relaxation of SP, but this is not necessarily true for their dual solutions. For each vehicle $k \in K$, we want to find if there exists some favorable route $p \in P^k \setminus \hat{P}^k$ that can improve the objective value of RMP. We define $\alpha, \beta$ as the dual variables corresponding to constraints (9) and (10), respectively, and define the decision variable $y = (y_{ijp}, (i,j) \in E, p \in P^k, k \in K)^T$ where $y_{ijp}$ takes value 1 if $(i,j) \in p$ and 0 otherwise. For each vehicle $k \in K$, with $\hat{\alpha}, \hat{\beta}$ being current optimal dual solution, the problem of pricing out a new route $p$ (if exists) is given by
\begin{equation}
(\text{PP}) \quad z^k_{\text{PP}}(\hat{\alpha}, \hat{\beta}) = \min_y \left\{ \hat{\beta}_k \sum_{(i,j) \in E} d_{ij} y_{ijp} - \sum_{(i,j) \in E, j \neq 0} \hat{\alpha}_j y_{ijp} \mid p \in P^k \right\}
\end{equation}
If the optimal objective value of PP is less than 0, then route $p$ can potentially improve the current best solution to RMP. For each vehicle $k \in K$, PP is equivalent to the problem finding the shortest path in $G(V,E)$, where the cost of the edge is replaced by its reduced cost $\bar{c}_{ij} = \hat{\beta}_k d_{ij} - \hat{\alpha}_j$ for each edge $(i,j) \in E, j \in V^+$, and $\bar{c}_{i0} = \hat{\beta}_k d_{i,0}$ for each edge $(i,0) \in E$. Since edge costs can be negative in PP, this problem is NP-hard [2]. Solution approaches for PP have been studied in [5, 10]. In this paper, we identify and generate the so-called “ng-route” by implementing the following procedure. Suppose that we assign a neighbor set to each node. An ng-route is a route where a node $i \in V^+$ can be revisited after a vehicle visits a node whose neighbor set does not contain node $i$. A label-setting algorithm, as shown in [5], can solve ng-route relaxation to PP that would improve the solution time of RMP.
### 3.2 Cutting Planes
Valid inequalities help improving the quality of the solution produced by RMP. We add subset-row inequalities from [17] as valid cuts when solving RMP. For any set $S = \{i_1,i_2,i_3\}$ containing three vertices $i_1,i_2,i_3 \in V^+$, the corresponding subset-row inequalities ensure that the sum of corresponding variables of all selected routes that visit at least two vertices in $S$ is at most 1. With set $I_S$ containing all the routes in $\bigcup_{k \in K} \hat{P}^k$ that visit at least two nodes in $S$, subset-row inequalities are in the form of:
\begin{equation}
\sum_{k \in K} \sum_{p \in I_S} \lambda_p \leq 1 \quad \forall S \subseteq V, |S| = 3.
\end{equation}
We use the algorithm from [21] to solve PP with additional dual variables associated with the added (13).
3.3 Branching Rule
We adopt the following branching rules from [9]: we calculate the sum of flows for each edge as $f_{ij}^k = \sum_{p \in p_k} a_{ijp} \lambda_p$ for all $(i, j) \in E$ and $k \in K$. If $f_{ij}^k$ is fractional, we generate two branches: $f_{ij}^k = 1$, where vehicle $k$ has to use edge $(i, j)$, and $f_{ij}^k = 0$, where we exclude edge $(i, j)$ from any route traveled by vehicle $k \in K$.
4 Approximation Algorithm
Our later computational results show that a straightforward implementation of BCP is time consuming for VRPCC. Here we propose an $O(\log n)$-approximation algorithm, where we recall that $n$ is the number of customer locations. The algorithm is based on the solution approach for the following problem defined on a network $G = (V, E)$.
**Problem 1.** Maximum Budgeted Cover Problem
*Input:* A node subset $X \subset V$, a fleet $K$ of vehicles and a budget $B \geq 0$.
*Output:* A set $H$ of routes, one for each vehicle $k \in K$, where each route has cost less than $B$.
*Objective:* Maximize $|H \cap X|$.
A greedy 2-approximation algorithm for this problem follows from [6]. This algorithm was based on the idea of iteratively picking a route that covers the maximum number of remaining nodes for the current node subset $X$. We propose a variant of this algorithm which is faster and still achieves a 2-approximation.
Our greedy algorithm works with an oracle for the orienteering problem, where $\mathcal{O}(X, B, i)$ outputs a route, with cost less than $B$, for vehicle $i \in K$, which covers the maximum number of nodes in $X$. The greedy algorithm, $\text{Greedy}(X, B)$, for the maximum budgeted cover problem is described in Algorithm 1.
**Algorithm 1:** A greedy algorithm for maximum budgeted cover
```
input : A fleet $K$ of vehicles, a subset $X \subset V$ and a budget of route $B$
output: A set $H$ of routes with cost less than $B$, one route for each vehicle
1 $H \leftarrow \emptyset$, $X' \leftarrow X$
2 for $i$ in $K$ do
3 $A_i = \mathcal{O}(X', B, i)$
4 $H \leftarrow H \cup \{A_i\}$, $X' \leftarrow X' \setminus A_i$
5 end
6 return $H$
```
We propose the following lemmas to analyze the above algorithm. The proofs are deferred to a full version.
**Lemma 1.** Algorithm 1 is a 2-approximation algorithm for the maximum budgeted cover problem.
Lemma 2. Greedy Algorithm needs to be executed at most $\log |X| + 1$ times to cover all nodes in $X$ with sufficient large budget $B$.
Next, we propose an approximation algorithm for VRPCC based on Algorithm 1. We set $X = V^+$, where recall that $V^+$ is the set of customer locations. If budget $B$ is sufficiently large that an optimal solution of maximum budgeted cover problem covers every node in $X$, then by Lemma 2, we can use Algorithm 1 to produce a feasible solution to VRPCC, where each vehicle carries routes with total cost at most $(\log n + 1)B$. We apply binary search to find the smallest budget $B$. We detail the algorithmic steps in Algorithm 2.
Algorithm 2: An approximation algorithm for VRPCC
input : A network $G = (V, E)$, a fleet set of vehicles $K$, an budget $B$
output: Routing assignment for each vehicle in $k \in K$
1 Initialize $S_k = \emptyset$ for all $k \in K$, $X \leftarrow V^+$, $Solve \leftarrow \text{true}$
2 while $X \neq \emptyset$ do
3 \hspace{1em} $H \leftarrow$ output of Algorithm 1 with input $K, X, B$
4 \hspace{1em} $n = |X|$, $X \leftarrow X \setminus H$
5 \hspace{1em} if $|X| > \frac{n}{2}$ then $Solve \leftarrow \text{false}$, go to Step 8
6 \hspace{1em} Update $S_k$ with $A_k \in H$ for all $k \in K$
7 end
8 Apply binary search to find optimal $B$ based on the result of $Solve$, go to Step 1 if $B$ is not optimal
9 Shortcut the routes in $S_k$, $k \in K$ to produce solution for VRPCC
The approximation factor of Algorithm 2 depends on the oracle for orienteering problem in Algorithm 1. If we use a “bicriteria” approximation for orienteering that covers the optimal number of nodes with cost at most $\beta B$ then Algorithm 2 yields an approximation factor of $\beta (\log n + 1)$ following the result from Lemma 2. In particular, we use a procedure from [14] which implies $\beta = 3$.
5 Numerical Results
We conduct numerical experiments to evaluate the performance of directly computing the MIP, the BCP algorithm, and the approximation algorithm. We conduct experiments on Solomon’s instances [23] adapted to VRPCC settings. The Solomon’s instances are classified into three classes according to different distributions of customer locations: random distribution (R), clustered distribution (C), and a mix of both (RC). The customer locations are distributed on a $[0, 100]^2$ square. In the Solomon’s instances, there are 100 locations for each instance. We pick the first $n$ locations to test our algorithms, where $n \in \{10, 15, 20, 25, 30\}$. We also test the performance of our algorithms on different fleet sizes $m \in \{3, 5\}$. For each location $v \in V^+$, we randomly pick two vehicles that are capable of serving the corresponding customer. In practice, the average productivity of a medical home crew ranges from 4–6 visits per day [11]. Therefore, the sizes of our test instances are close to real-world medical home care instances.
In our numerical experiments, for each test instance, we first solve the problem with model MIP and use the result as a benchmark. We use Gurobi 6.5 [16] as the optimization solver. For the BCP algorithm, we use Gurobi as a linear programming solver of RMP at each branched node, and managing the branching process by following the branching rule in Section 3.3. For the approximation algorithm, we apply a procedure by Garg [14] that solves orienteering problem for optimal number of nodes but with a budget $5B$ in Algorithm 1. We set the running time limit for all programs as 1,200 seconds. We use Java and perform numerical test on a Dell desktop with an Intel i7-3770 processor and 16 GB memory.
For each instance, we report the following information: for MIP and BCP, we report their best upper bounds (“UB”) and lower bounds (“LB”) achieved, their gaps (“Gap”) and computational time (“Time(s)’’); for approximation algorithm, we report the objective values of its solutions (“Obj”) and computational time (“Time(s)”). Tables 1 and 2 summarize the numerical performances of the three methods. We use “—” to indicate that time limit for the computation of the instance is reached.
**Table 1.** Numerical results with $m = 3$
| Type | $n$ | MIP LB | MIP UB | MIP Gap | MIP Time(s) | BCP LB | BCP UB | BCP Gap | BCP Time(s) | Approx. Obj | Approx. Time(s) |
|------|-----|--------|--------|---------|-------------|--------|--------|---------|-------------|------------|----------------|
| | | | | | | | | | | | |
| R101 | 10 | 87.00 | 87.00 | 0.00% | 0.15 | 87.00 | 87.00 | 0.00% | 4.26 | 147.00 | 0.16 |
| | 15 | 100.00 | 100.00 | 0.00% | 3.77 | 100.00 | 100.00 | 0.00% | 288.20 | 155.00 | 0.19 |
| | 20 | 114.00 | 114.00 | 0.00% | 26.94 | 104.00 | 143.00 | 27.27% | – | 200.00 | 0.57 |
| | 25 | 140.00 | 140.00 | 0.00% | 912.77 | 122.00 | 223.00 | 45.29% | – | 230.00 | 1.10 |
| | 30 | 138.00 | 153.00 | 9.80% | – | 132.58 | 252.00 | 47.39% | – | 247.00 | 1.83 |
| C101 | 10 | 40.00 | 40.00 | 0.00% | 1.12 | 40.00 | 40.00 | 0.00% | 6.58 | 48.00 | 0.18 |
| | 15 | 59.00 | 79.00 | 25.32% | – | 40.84 | 80.00 | 48.95% | – | 93.00 | 0.20 |
| | 20 | 42.00 | 87.00 | 51.72% | – | 53.00 | 93.00 | 43.01% | – | 102.00 | 0.58 |
| | 25 | 44.00 | 93.00 | 52.69% | – | 57.71 | 109.00 | 47.06% | – | 111.00 | 1.20 |
| | 30 | 44.00 | 94.00 | 53.19% | – | 62.41 | 136.00 | 54.11% | – | 140.00 | 3.48 |
| RC101| 10 | 87.00 | 87.00 | 0.00% | 0.63 | 87.00 | 87.00 | 0.00% | 5.90 | 131.00 | 0.14 |
| | 15 | 119.00 | 119.00 | 0.00% | 1137.84 | 71.02 | 120.00 | 40.82% | – | 171.00 | 0.27 |
| | 20 | 112.00 | 132.00 | 15.15% | – | 86.48 | 132.00 | 34.48% | – | 199.00 | 0.43 |
| | 25 | 92.00 | 157.00 | 41.40% | – | 105.27 | 192.00 | 45.17% | – | 261.00 | 1.40 |
| | 30 | 137.00 | 218.00 | 37.16% | – | 126.90 | 332.00 | 61.78% | – | 282.00 | 1.88 |
In Table 1, when $m = 3$, we see that MIP performs well for instances of type R, in which it can solve up to 25-node instances. For instances of types C and RC, we can no longer use MIP to solve instances with more than 15 nodes. This shows that clustered distribution of nodes is more challenging to handle. At the same time, BCP does not outperform MIP, and we can only use BCP to solve instances with 15 nodes or fewer. Although BCP algorithm cannot be solved very efficiently yet, it can produce better lower bound for instances that both MIP and BCP cannot solve to optimality, e.g., instances with 20, 25, and 30 nodes of type C. On the other hand, approximation algorithm solves all the instances very quickly.
Table 2. Numerical results with $m = 5$
| Type | $n$ | MIP LB | MIP UB | MIP Gap | MIP Time(s) | BCP LB | BCP UB | BCP Gap | BCP Time(s) | Approx. Obj | Approx. Time(s) |
|------|-----|--------|--------|---------|-------------|--------|--------|---------|-------------|------------|----------------|
| R | 10 | 69.00 | 69.00 | 0.00% | 0.02 | 69.00 | 69.00 | 0.00% | 0.74 | 119.00 | 0.04 |
| | 15 | 97.00 | 97.00 | 0.00% | 0.23 | 97.00 | 97.00 | 0.00% | 115.94 | 162.00 | 0.09 |
| | 20 | 106.00 | 106.00 | 0.00% | – | 93.00 | 116.00 | 19.83% | – | 210.00 | 0.25 |
| | 25 | 120.00 | 120.00 | 0.00% | 29.45 | 98.00 | 142.00 | 30.99% | – | 220.00 | 0.50 |
| | 30 | 123.00 | 123.00 | 0.00% | 59.36 | 103.92 | 148.00 | 29.78% | – | 193.00 | 0.78 |
| C | 10 | 40.00 | 40.00 | 0.00% | 0.04 | 40.00 | 40.00 | 0.00% | 0.99 | 42.00 | 0.03 |
| | 15 | 78.00 | 78.00 | 0.00% | 4.71 | 78.00 | 78.00 | 0.00% | 465.68 | 85.00 | 0.10 |
| | 20 | 82.00 | 82.00 | 0.00% | 914.80 | 50.00 | 85.00 | 41.18% | – | 96.00 | 0.22 |
| | 25 | 62.00 | 85.00 | 27.06% | – | 52.38 | 123.00 | 57.41% | – | 127.00 | 0.45 |
| | 30 | 61.00 | 87.00 | 29.89% | – | 55.43 | 106.00 | 47.71% | – | 110.00 | 1.00 |
| RC | 10 | 83.00 | 83.00 | 0.00% | 0.09 | 83.00 | 83.00 | 0.00% | 2.08 | 115.00 | 0.03 |
| | 15 | 105.00 | 105.00 | 0.00% | 7.00 | 105.00 | 105.00 | 0.00% | 344.88 | 131.00 | 0.12 |
| | 20 | 130.00 | 130.00 | 0.00% | 25.76 | 94.33 | 169.00 | 44.18% | – | 197.00 | 0.28 |
| | 25 | 137.00 | 139.00 | 1.44% | – | 95.28 | 202.00 | 52.83% | – | 246.00 | 0.50 |
| | 30 | 167.00 | 171.00 | 2.34% | – | 109.27 | 328.00 | 66.69% | – | 307.00 | 0.82 |
The computation can be finished within 4 seconds for all instances, and there is no significant difference in computational time when solving instances of type C/RC than type R. Moreover, despite that the theoretical approximation bound of our algorithm could be large when $n$ increases, the practical approximation ratio is within a factor of 2 when comparing the objective values of solutions produced by the approximation algorithm with the best lower bounds produced by MIP and BCP for all instances.
Table 2 summarizes the numerical results for instances with larger fleet size $m = 5$. Results show that the computational time has been significantly improved and more instances can be solved by MIP and BCP. Our approximation algorithm can solve all instances within one second, and the practical approximation ratio is still within a factor of 2 comparing its objective values of solutions with the best lower bounds of MIP and BCP.
To summarize, we recognize that different distributions of demand locations could affect the computational time of our proposed exact solution methods. Despite lacking efficient exact solution approaches for VRPCC, our proposed approximation algorithm can efficiently solve the problem and provides good practical solutions.
6 Conclusions and Future Research
In this paper, we formulated a minimum makespan routing problem with compatibility constraints. We proposed three solution approaches for the problem: MIP, BCP, and an approximation algorithm. Numerical results showed that MIP and BCP could not solve many of these instances to optimality (within our time limit), whereas the approximation algorithm obtained good quality solutions.
within seconds. Moreover, our approximate solutions (for these instances) are within two times the best lower bounds from MIP or BCP. Future research includes further investigation on BCP to improve its efficiency and designing good implementations to improve the practical approximation factor of the approximation algorithm.
Bibliography
[1] N. R. Achuthan, L. Caccetta, and S. P. Hill. An improved branch-and-cut algorithm for the capacitated vehicle routing problem. *Transportation Science*, 37(2):153–169, 2003.
[2] R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. *Network flows: Theory, algorithms, and applications*. Prentice hall, 1993.
[3] D. Applegate, W. Cook, S. Dash, and A. Rohe. Solution of a min-max vehicle routing problem. *INFORMS Journal on Computing*, 14(2):132–143, 2002.
[4] E. M. Arkin, R. Hassin, and A. Levin. Approximations for minimum and min-max vehicle routing problems. *Journal of Algorithms*, 59(1):1–18, 2006.
[5] R. Baldacci, A. Mingozzi, and R. Roberti. New route relaxation and pricing strategies for the vehicle routing problem. *Operations Research*, 59(5):1269–1283, 2011.
[6] C. Chekuri and A. Kumar. Maximum coverage problem with group budget constraints and applications. In *Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques*, pages 72–83. Springer, 2004.
[7] G. B. Dantzig and J. H. Ramser. The truck dispatching problem. *Management Science*, 6(1):80–91, 1959.
[8] G. Even, N. Garg, J. Könemann, R. Ravi, and A. Sinha. Min–max tree covers of graphs. *Operations Research Letters*, 32(4):309–315, 2004.
[9] D. Feillet. A tutorial on column generation and branch-and-price for vehicle routing problems. *A Quarterly Journal of Operations Research*, 8(4):407–424, 2010.
[10] D. Feillet, P. Dejax, M. Gendreau, and C. Gueguen. An exact algorithm for the elementary shortest path problem with resource constraints: Application to some vehicle routing problems. *Networks*, 44(3):216–229, 2004.
[11] N. A. for Home Care & Hospice. Basic statistics about home care. *Washington, DC: National Association for Home Care & Hospice*, pages 1–14, 2010.
[12] G. N. Frederickson, M. S. Hecht, and C. E. Kim. Approximation algorithms for some routing problems. In *Foundations of Computer Science, 1976., 17th Annual Symposium on*, pages 216–227. IEEE, 1976.
[13] R. Fukasawa, H. Longo, J. Lysgaard, M. P. de Aragão, M. Reis, E. Uchoa, and R. F. Werneck. Robust branch-and-cut-and-price for the capacitated vehicle routing problem. *Mathematical Programming*, 106(3):491–511, 2006.
[14] N. Garg. A 3-approximation for the minimum tree spanning $k$ vertices. In *Proceedings of the 37th Annual Symposium on Foundations of Computer Science*, FOCS ’96, pages 302–309, Washington, DC, USA, 1996. IEEE Computer Society.
[15] B. L. Golden, S. Raghavan, and E. A. Wasil. *The Vehicle Routing Problem: Latest Advances and New Challenges*. Springer Science & Business Media, 2008.
[16] Gurobi Optimization, Inc. Gurobi optimizer reference manual, 2016. URL http://www.gurobi.com.
[17] M. Jepsen, B. Petersen, S. Spoorendonk, and D. Pisinger. Subset-row inequalities applied to the vehicle-routing problem with time windows. *Operations Research*, 56(2):497–511, 2008.
[18] B. Kallehauge, J. Larsen, O. B. Madsen, and M. M. Solomon. Vehicle routing problem with time windows. In *Column Generation*, pages 67–98. Springer, 2005.
[19] A. N. Letchford, R. W. Eglese, and J. Lysgaard. Multistars, partial multistars and the capacitated vehicle routing problem. *Mathematical Programming*, 94(1):21–40, 2002.
[20] J. Lysgaard, A. N. Letchford, and R. W. Eglese. A new branch-and-cut algorithm for the capacitated vehicle routing problem. *Mathematical Programming*, 100(2):423–445, 2004.
[21] D. Pecin, A. Pessoa, M. Poggi, and E. Uchoa. Improved branch-cut-and-price for capacitated vehicle routing. In *International Conference on Integer Programming and Combinatorial Optimization*, pages 393–403. Springer, 2014.
[22] T. K. Ralphs, L. Kopman, W. R. Pulleyblank, and L. E. Trotter. On the capacitated vehicle routing problem. *Mathematical Programming*, 94(2-3):343–359, 2003.
[23] M. M. Solomon. Algorithms for the vehicle routing and scheduling problems with time window constraints. *Operations Research*, 35(2):254–265, 1987.
[24] P. Toth and D. Vigo. *Vehicle Routing: Problems, Methods, and Applications*. SIAM, 2014.
|
<urn:uuid:82c36934-b97e-4340-9be3-7d8b85f03789>
|
CC-MAIN-2021-04
|
http://viswa.engin.umich.edu/wp-content/uploads/sites/169/2014/08/vrpcc.pdf
|
2021-01-27T04:00:23+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2021-04/subset=warc/part-00026-364a895c-5e5c-46bb-846e-75ec7de82b3b.c000.gz.parquet
| 109,164,060
| 9,087
|
eng_Latn
|
eng_Latn
| 0.887445
|
eng_Latn
| 0.968578
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
2474,
6169,
8747,
11780,
14117,
17056,
21335,
25275,
25603,
28232,
29682
] |
TEXAS ETHICS COMMISSION
ORDER and AGREED RESOLUTION
I. Recitals
The Texas Ethics Commission (the commission) met on August 8, 2013, to consider sworn complaint SC-31107174. A quorum of the commission was present. The commission determined that there is credible evidence of violations of sections 254.031 and 253.1611 of the Election Code, and section 20.62 of the Ethics Commission Rules, laws administered and enforced by the commission. To resolve and settle this complaint without further proceedings, the commission proposed this resolution to the respondent.
II. Allegations
The complaint alleged that the respondent: 1) did not properly disclose political contributions and political expenditures on multiple campaign finance reports; 2) made unlawful political contributions to political committees in excess of $250 in a calendar year; and 3) did not properly disclose in a campaign finance report, assets valued at $500 or more that were purchased with political contributions.
III. Facts Supported by Credible Evidence
Credible evidence available to the commission supports the following findings of fact:
Total Political Contributions Maintained
1. The complaint alleged that the respondent did not disclose the proper amount of total political contributions maintained on his July 2010 and 2011, and January 2011 semiannual reports.
2. The evidence did not show that the amounts originally disclosed were incorrect.
Reporting Political Expenditures as Reimbursements
3. The complaint alleged that the respondent improperly reported expenditures as reimbursements for 12 expenditures totaling approximately $1,110. The expenditures were disclosed as non-political expenditures on the reports at issue.
4. The respondent admitted in his response to the complaint that he did not originally disclose the correct payee for the political expenditures at issue.
Disclosure of the Addresses for Political Expenditures
5. The complaint alleged that the respondent did not include complete addresses for approximately $7,940 in expenditures disclosed on his semiannual reports for January and July 2010 and January and July 2011. Two of the expenditures totaling approximately $2,000 were disclosed as political expenditures from personal funds. The remaining expenditures (approximately $5,940) were disclosed as non-political expenditures on the originally filed reports.
6. The reports disclose that the respondent did not include a street address or zip code for approximately $5,530 of the expenditures at issue.
7. The reports disclose that the respondent did not include a street address, zip code, state or city, for approximately $2,110 of the expenditures at issue. Of that amount, $1,800.27 was for an expenditure to "Shop for Art.com."
8. The reports disclose that the respondent did not include a street address for one $300 expenditure at issue.
9. Of the expenditures at issue, five of the expenditures totaling approximately $120 are expenditures of less than $50 during the reporting period to the individual payee.
Reporting an Asset of $500 or More
10. The complaint alleged that the respondent did not include on the respondent's January 2010 semiannual report information concerning an asset on hand valued at over $500.
11. The respondent's January 2010 semiannual report disclosed that the respondent made a $1,800.27 expenditure on July 24, 2009, to "Shop for Art.com," for "art for jury room." The report did not include a Schedule M (used for assets on hand valued at over $500) with that report.
12. On August 3, 2011, the respondent filed a correct report that included a Schedule M that described the following:
Artwork I purchased from shopforart.com to decorate the jury room. This consisted of several framed prints for which I paid $1643.34 plus shipping. I intend to leave these in the jury room when I leave the bench but I guess technically they are compaign [sic] account assets for the time being.
Excessive Contributions to Political Committee When Not on Ballot
13. The complaint alleged that the respondent used political contributions to knowingly make political contributions to a political committee in excess of $250 during calendar years 2009, 2010 and 2011 in which the respondent's office held was not on the ballot.
14. The political contributions at issue were disclosed as expenditures on the respondent's January and July 2010 and January and July 2011 semiannual reports.
15. The respondent's January 2010, July 2010, and January 2011 semiannual reports disclosed expenditures to benefit the Harris County Democratic Party.
16. The expenditures to benefit the Harris County Democratic Party are as follows:
* October 8, 2009, $2,500 to the Harris County Democratic Party, with a purpose described as "Johnson Richards Rayburn dinner table purchase\n (contribution to HCDP)."
* April 26, 2010, $7,500 to the Harris County Democratic Party, with a description of "political contribution."
* October 6, 2010, $2,500 to the Harris County Democratic Party, with a description of "JRR Dinner [HCDP fundraising event]."
* October 27, 2010, $3,000 to the Harris County Democratic Party, with a description of "political contribution for 2010 general election."
17. In a supplement to his response to the complaint, the respondent swore to the following:
Complainant states I made contributions in excess of $250 to the Harris County Democratic Party in violation of Texas Election Code §253.1611. Complainant is apparently referring specifically to §253.1611(d) given the repeated reference to contributions "exceeding $250." Complainant points to a $2500 contribution made on October 8, 2009, a $7500 contribution on April 26, 2010, and a $2,500 contribution on October 6, 2010.
Texas Election Code §253.1611(e)(2) provides an express exception to the $250 limitation contained in §253.1611(d), for contributions made to a county executive committee of a political party. Specifically, the Harris County Democratic Party ("HCDP") requested that I make the three contributions in question to the county executive committee for the purpose of defraying my pro rata share of the HCDP's normal overhead and administrative and/or operating costs. These funds were used for that purpose.
18. The respondent did not address the allegations concerning the $3,000 to the Harris County Democratic Party on October 27, 2010.
19. The Harris County Democratic Party (HCDP) is a county executive committee on file with the commission. HCDP's January 2010 semiannual report disclosed a $3,000 political contribution from the respondent dated December 16, 2010. The remaining political expenditures to HCDP disclosed on the respondent's reports at issue were not found on HCDP's campaign finance reports for the same periods.
20. The respondent's January 2010 semiannual report disclosed expenditures on Schedule I to benefit the "American Board of Trial Advocates."
21. The expenditures to benefit the American Board of Trial Advocates are as follows:
* July 23, 2009, $335.42 to the "political contribution for 2010 general election," described as "2009 membership dues for ABOTA."
* December 9, 2009, $200 to the American Board of Trial Advocates, described as "2010 membership dues for ABOTA."
22. According to their website the American Board of Trial Advocates is a national association of experienced trial lawyers and judges dedicated to the preservation and promotion of the civil jury trial right provided by the Seventh Amendment to the U.S. Constitution. The evidence did not show that American Board of Trial Advocates is a political committee.
23. The respondent's July 2011 semiannual report disclosed an expenditure on Schedule I to benefit "The Progressive Forum."
24. The expenditure to benefit The Progressive Forum is as follows:
* May 11, 2011, $1,500 to The Progressive Forum, described as a "Contribution/donation for 2011-2012 speaker year."
25. According to their website the Progressive Forum, Houston, is a civic speaker organization dedicated to enriching our democracy and culture by presenting the great minds we believe are advancing the success of the individual, our species, and life on the planet, great minds from all the fields of human endeavor, the sciences and humanities as well as politics and public affairs. The website additionally states that The Progressive Forum is a nonpartisan, nonprofit 501(c)(3) organization. The evidence did not show that The Progressive Forum is a political committee.
26. In his response to the allegations regarding the expenditures to The Progressive Forum and American Board of Trial Advocates, the respondent swore, in pertinent part, to the following:
I deny I violated section 253.1611(d) of the Election Code as alleged in the complaint by making contributions to…the Progressive Forum, and by paying my membership dues to the American Board of Trial Advocates [ABOTA]. The Progressive Forum is not a political committee. ABOTA is not a political committee and my payment to ABOTA was for membership dues…
IV. Findings and Conclusions of Law
The facts described in Section III support the following findings and conclusions of law:
Total Political Contributions Maintained
1. Each campaign finance report must include as of the last day of a reporting period for which the person is required to file a report, the total amount of political contributions accepted, including interest or other income on those contributions, maintained in one or more accounts in which political contributions are deposited as of the last day of the reporting period. ELEC. CODE § 254.031(a)(8).
2. A de minimis error in calculating or reporting a cash balance under Subsection (a)(8) is not a violation of section 254.031. ELEC. CODE § 254.031(a-1).
3. There is credible evidence of no violation of section 254.031(a)(8) of the Election Code with respect to the semiannual reports at issue.
Reporting Political Expenditures and Reimbursements
4. A campaign finance report must include, for all political expenditures that in the aggregate exceed $50 and that are made during the reporting period, the full name and address of the persons to whom political expenditures are made and the dates and purposes of the expenditures. ELEC. CODE § 254.031(a)(3).
5. Ethics Commission Rule § 20.62 states that political expenditures made out of personal funds by a staff member of an officeholder or candidate, with the intent to seek reimbursement from the officeholder or candidate, that in the aggregate do not exceed $5,000 during the reporting period may be reported as follows if the reimbursement occurs during the same reporting period that the initial expenditure was made:
(1) The amount of political expenditures that in the aggregate exceed $50 and that are made during the reporting period, the full name and address of the persons to whom the expenditures are made and the dates and purposes of the expenditures; and
(2) Included with the total amount or a specific listing of the political expenditures of $50 or less made during the reporting period.
6. Ethics Commission Rule § 20.62 also states, in relevant part, that if the staff member is not reimbursed during the same reporting period, or is reimbursed more than $5,000 in the aggregate during the reporting period, then a political expenditure made out of personal funds by the staff member of an officeholder or candidate with the intent to seek reimbursement from the officeholder or candidate must be reported as follows:
(1) The aggregate amount of the expenditures made by the staff member as of the last day of the reporting period is reported as a loan to the officeholder, or candidate;
(2) The expenditure made by the staff member is reported as a political expenditure by the officeholder or candidate; and
(3) The reimbursement to the staff member to repay the loan is reported as a political expenditure by the officeholder or candidate.
7. The respondent admits in his response to the complaint that he did not originally disclose the correct payee for the political expenditures at issue. Additionally, since the expenditures at issue were originally reported as non-political expenditures, the respondent did not report them on the proper schedule. Therefore, there is credible evidence of violations of section 254.031(a)(3) of the Election Code and section 20.62 of the Ethics Commission Rules.
Disclosure of the Addresses for Political Expenditures
8. A campaign finance report must include, for all political expenditures that in the aggregate exceed $100 1 and that are made during the reporting period, the full name and address of the persons to whom political expenditures are made and the dates and purposes of the expenditures. ELEC. CODE § 254.031(a)(3).
1 $50 during the time at issue in the complaint.
9. A campaign finance report must include, the total amount of all political contributions accepted and the total amount of all political expenditures made during the reporting period. ELEC. CODE § 254.031(a)(6).
10. The complaint alleged that the respondent did not include complete addresses for approximately $7,940 in expenditures disclosed on his semiannual reports for January and July 2010 and January and July 2011. The expenditures at issue did not disclose complete addresses.
11. Of the expenditures at issue, five of the expenditures totaling approximately $120 are expenditures of less than $50 during the reporting period to the individual payee. Those expenditures were not required to be itemized. Therefore, with regard to those expenditures, there is credible evidence of no violation of section 254.031(a)(3) of the Election Code.
12. The remaining approximately $7,820 in expenditures did not disclose complete addresses, and were required to be itemized. Of those expenditures required to be itemized, approximately $5,820 were also incorrectly reported as non-political expenditures. Therefore, with regard to those expenditures, there is credible evidence of violations of section 254.031(a)(3) of the Election Code.
13. By moving expenditures from the schedule for non-political expenditures, to the schedule for political expenditures, the respondent's corrections to the reports at issue also caused the amount of total political expenditures disclosed on the originally filed reports to be changed. Those amounts were not correct as originally filed. Therefore, there is credible evidence of violations of section 254.031(a)(6) of the Election Code.
Reporting an Asset of $500 or More
14. Each report by a candidate for judicial office must include a specific listing of each asset valued at $500 or more that was purchased with political contributions and on hand as of the last day of the reporting period. ELEC. CODE § 254.0611(a)(3).
15. The phrase "on hand" is not defined in title 15 of the Election Code. In construing a statute, words and phrases shall be read in context and construed according to the rules of grammar and common usage. GOV'T CODE § 311.011(a). A standard dictionary defines "on hand" as "in present possession or readily available." Merriam-Webster's Collegiate Dictionary, Tenth Edition, 526 (1996).
16. The respondent admits that he did not disclose the asset at issue (framed prints) on the report at issue. The asset at issue does not appear to have been gifted to the court by the end of the reporting period, and therefore appears to be an asset of the respondent. The asset was previously disclosed as a political expenditure on the same report. Not reporting it additionally on Schedule M did not substantially effect disclosure. There is credible
evidence of a technical or de minimis violation of section 254.0611(a)(3) of the Election Code.
Excessive Contributions to Political Committee When Not on Ballot
17. A judicial officeholder may not, in any calendar year in which the office held is not on the ballot, use a political contribution to knowingly make a political contribution to a political committee that, when aggregated with each other political contribution to a political committee in that calendar year, exceeds $250. ELEC. CODE § 253.1611(d).
18. Section 253.1611 of the Election Code does not apply to a political contribution made to the principal political committee of the state executive committee or a county executive committee of a political party that (1) is made in return for goods or services, including political advertising or a campaign communication, the value of which substantially equals or exceeds the amount of the contribution; or (2) is in an amount that is not more than the candidate's or officeholder's pro rata share of the committee's normal overhead and administrative or operating costs. ELEC. CODE § 253.1611(e).
19. District judges in the state of Texas serve four-year terms. TEX. CONST. ART. V, § 7. Since the respondent was re-elected as district judge in November of 2008, he was not up for reelection until 2012. Therefore, the respondent's office of district judge was not on the ballot in 2009 or 2010, the calendar years when the political contributions at issue were made. Thus, the respondent could not use political contributions to make political contributions to a political committee that exceeded $250 in 2009 or 2010, unless the exception under section 253.1611(e) of the Election Code was satisfied.
20. According to the respondent's campaign finance reports, during calendar years 2009 and 2010, he made four political contributions totaling approximately $15,500 to HCDP, an amount greater than the $250 allowed per year by statute.
21. In his response to the complaint, the respondent swore that three of the political contributions (totaling approximately $12,500) were for the purposes of defraying his pro rata share of HCDP's normal overhead and administrative and/or operating costs and that the funds were used for those purposes. There is insufficient evidence of a violation of section 253.1611(d) of the Election Code with regard to those three political contributions.
22. Regarding the $3,000 political contribution to HCDP, the January 2011 semiannual report described the political expenditure as a "political contribution for 2010 general election." The purpose clearly states that the contribution to HCDP was for use in the 2010 general election. That amount exceeded the $250 allowed by statute. Therefore, with regard to that contribution, there is credible evidence of a violation of section 253.1611(d) of the Election Code.
23. The remaining approximately $2,040 in expenditures at issue to the American Board of Trial Advocates and The Progressive Forum were not contributions to political committees. Therefore, there is credible evidence of no violation of section 253.1611(d) of the Election Code with respect to those contributions.
V. Representations and Agreement by Respondent
By signing this order and agreed resolution and returning it to the commission:
1. The respondent neither admits nor denies the facts described under Section III or the commission's findings and conclusions of law described under Section IV, and consents to the entry of this order and agreed resolution solely for the purpose of resolving this sworn complaint.
2. The respondent consents to this order and agreed resolution and waives any right to further proceedings in this matter.
3. The respondent acknowledges that: 1) a campaign finance report must include, for all political expenditures that in the aggregate exceed $100 ($50 during the period at issue) and that are made during the reporting period, the full name and address of the persons to whom political expenditures are made and the dates and purposes of the expenditures; 2) the respondent also acknowledges that reimbursement to staff should be reported in compliance with section 20.62 of the Ethics Commission Rules; 3) the respondent also acknowledges that a campaign finance report must include, the total amount of all political contributions accepted and the total amount of all political expenditures made during the reporting period; and 4) the respondent also acknowledges that a judicial officeholder may not, in any calendar year in which the office held is not on the ballot, use a political contribution to knowingly make a political contribution to a political committee that, when aggregated with each other political contribution to a political committee in that calendar year, exceeds $250.
The respondent agrees to comply with these requirements of the law.
VI. Confidentiality
This order and agreed resolution describes violations that the commission has determined are neither technical nor de minimis. Accordingly, this order and agreed resolution is not confidential under section 571.140 of the Government Code and may be disclosed by members and staff of the commission.
VII. Sanction
After considering the nature, circumstances, and consequences of the violations described under Sections III and IV, and the sanction necessary to deter future violations, the commission imposes a $700 civil penalty.
VIII. Order
The commission hereby orders that if the respondent consents to the proposed resolution, this order and agreed resolution is a final and complete resolution of SC-31107174.
AGREED to by the respondent on this _______ day of _____________, 20__.
______________________________
Michael Miller, Respondent
EXECUTED ORIGINAL received by the commission on: _________________________.
Texas Ethics Commission
By: ______________________________
David A. Reisman, Executive Director
|
<urn:uuid:2e402ce3-03dd-4e27-a0e1-15ceac501ae3>
|
CC-MAIN-2023-50
|
https://www.ethics.state.tx.us/data/enforcement/sworn_complaints/2011/31107174.pdf
|
2023-12-01T16:23:30+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-50/subset=warc/part-00029-e565b809-b335-4c1d-90fd-54a9a2b7113d.c000.gz.parquet
| 824,253,382
| 4,491
|
eng_Latn
|
eng_Latn
| 0.996862
|
eng_Latn
| 0.997708
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1444,
3553,
5764,
7942,
10308,
12855,
15682,
18558,
21127,
21625
] |
CDCC Program Requirements for Care & Services
Clinical and Sub-Specialty Services
Certified Duchenne Care Centers employee teams of sub-specialists offering comprehensive sub-specialty care and clinical services to people and families living with Duchenne. The each sub-specialist will be expected to provide care according to the CDCCP Standards.
Centers must include access to the following providers at each visit (at the same facility, during the same multi-day or single-day visit):
* Center director
* Clinic coordination, preferably by a nurse and/or nurse practitioner
* Neurologist and/or physical medicine and rehabilitation with training and/or expertise in neuromuscular care
* Cardiology
* Pulmonary
* Genetic counseling (available to see families within 6 months of diagnosis)
* Physical therapy (PT)
* Social work familiar with the diagnosis of Duchenne and the needs of families/patients, available in person or by phone as needed
The following sub-specialty and clinical services must be available as needed to see patients (at the same facility, during the same multi-day or single-day visit) when appropriate:
* Gastroenterology/Urology
* Orthopedics
* Endocrinology
* Palliative care
* Surgery
* Durable medical equipment (DME)
* Nutrition
* Orthotics
* Occupational therapy (OT)
* Psychology/Neuropsychology/Counseling/Developmental pediatrics/Neurodevelopmental Disabilities
* Speech therapy
* Wheelchair specialist
Provision of Care
Care will be provided according to the standards as identified by the Duchenne muscular dystrophy, Care Consideration Working Group, and specified by the Certified Duchenne Care Center Program. Measures for care in the 5 identified domains include
Coordination and Communication
Measures for the Center:
* Designated clinic coordinator (preferably a RN or CNP)
* If patients over 21yo are seen, relationships have been formed with adult sub-specialty providers
Measures for the Patients:
* A copy of the visit note/summary is sent to the primary care provider
* Disease specific information/resources available/sent to primary care providers
* Patients/families receive a copy of the note/summary sent to their primary care provider, or will have access to an electronic copy of their note/summary
Pulmonary
* Patients are measured for height/length by standing (when appropriate) and ulnar length at each pulmonary visit.
* Patients >6yo, for whom it is appropriate, receive standard spirometery FVC, FEV1, FEV1/FVC ratio, FEF 25-75) once while ambulatory and once/twice annually after loss of ambulation by a certified respiratory therapist at a reliable institution/lab.
* Cough peak flow is measured in patients >6yo for whom it is appropriate, at least annually and more often as needed.
* %O2 Sat measured at least annually and more often as needed.
* End tidal CO2, or its equivalent (i.e., blood gasses) is measured at each visit for patients > 6 years for whom it is appropriate
* Capnography is checked at least annually in patients with oxygen saturations <95% and more often as needed
* Patients will be questioned regarding symptoms of sleep related hypoventilation at each visit.
* Sleep studies are encouraged when FVC is <50% predicted;; overnight pulse oxymetry may be used if a sleep study is not available.
* Cough assist will be offered when the cough peak flow is <270 lpm, or otherwise indicated.
* Cough assist use is encouraged and practiced during respiratory illnesses while ambulatory, and daily and as needed during respiratory illnesses when non-ambulatory.
* Bi-PAP is encouraged for the management of sleep related hypoventilation when FVC <30% and/or with evidence of sleep related hypoventilation on polysomnogram.
* Daytime intermittent ventilation will be encouraged when exhaled PCO2 >45 mmHg or when Hgb sat <92% while awake.
Cardiology
* Every patient has a clinical visit with a cardiologist at diagnosis or before age 6, then at least bi-annually until age 10, and once/twice annually thereafter.
* Every patient receives an EKG at diagnosis or before age 6, at least bi-annually until age 10, and once/twice annually thereafter, or at the discretion of the clinician.
* Every patient receives cardiac imaging at diagnosis or before age 6, at least bi-annually until age 10, and once/twice annually thereafter.
* Cardiac medications are offered with evidence of decreasing cardiac function of by echocardiogram or MRI, with the onset of heart failure (SF< 28%, EF <55%) and/or with evidence of cardiac fibrosis by MRI, or sooner at the discretion of the cardiac provider.
2
Neuromuscular Care (Neurology/PM&R)
* Patients receive a baseline x-ray with any clinical evidence of scoliosis while ambulatory, or within 1 year of loss of ambulation, regardless of the presence or absence of signs of scoliosis.
* Scoliosis evaluation is performed annually when the curve is <15-20 degrees and every 6 months when the curve(s) >20 degrees during skeletal growth, and after growth if clinically indicated.
* Patients have longitudinal strength testing as part of clinical care at least annually.
* Patients have a functional assessment as part of clinical care at least annually.
* Night splints are offered at first evidence of plantar flexion contracture and encouraged throughout the life span as indicated in order to delay/prevent deformity.
* Patients have OT/PT evaluations every 4-6 months to prevent contractures.
* Patients see an OT/PT/PM&R provider at least annually for evaluation and recommendations.
* The use of corticosteroids, and their side effects will be discussed with every person with Duchenne, or their parent, over age 3.
* Every patient, for whom it is appropriate, will be prescribed a corticosteroid by age 6yo or before.
* Continued use of corticosteroids throughout the lifespan is encouraged.
* Neurodevelopmental/psychosocial topics (risk for learning disability, behavioral disorder (ADD/ADHD, autism, OCD), need for IEP or 504 Plan (for cognitive or physical indications), need for neurocognitive evaluation, risk for social isolation of the person living with Duchenne and/or parents) will be discussed at least once with parents and followed up on appropriately.
* Informal assessments for emotional adjustment/coping, speech/language, signs of autism, signs of behavioral disorder (ADD, ADHD, OCD), signs of emotional disorder (anxiety, depression) and social isolation will be performed at each visit.
Genetic/Genetic Counseling
* Each patient is encouraged to have genetic testing.
* Genetic counseling is available at each clinic, and will include genetic risk, carrier testing and pre- implantation genetics (as appropriate)
Endocrine and Bone Health
* Patients are weighed at each visit, standing or sitting;; pre-recorded wheelchair weights are not recommended.
* Height/length is measured at each visit during growth, and annually thereafter, either by standing and/or by ulnar length.
* Pubertal development by Tanner staging is annually performed by either primary care and shared by parent/patient report, or performed by endocrinology
* Patients taking corticosteroids receive bone density testing within 1 year of beginning corticosteroids and repeated every 1-2 years.
* Patients not taking corticosteroids receive bone density testing within a year of loss of ambulation and repeated every 1-2 years.
* Patients taking steroids have 25-OH vitamin D checked just prior to starting corticosteroids and repeated annually.
* Patients taking corticosteroids are screened annually for signs/symptoms of DM type II and I.
* Patients taking corticosteroids with signs/symptoms of DM type I and/or II have an oral glucose tolerance test (OGTT) for definitive diagnosis.
* Patients are referred to endocrinology for any issues regarding height/growth/pubertal delay and bone health.
|
<urn:uuid:f0764bd2-c9ab-40e1-88c8-7f05333fbcb2>
|
CC-MAIN-2019-04
|
http://join.parentprojectmd.org/site/DocServer/CDCCP_Measures_for_care.pdf?docID=15683&_ga2.128995076.966205156.1541423757-782366217.1538927903
|
2019-01-23T05:49:52Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583897417.81/warc/CC-MAIN-20190123044447-20190123070447-00398.warc.gz
| 118,719,665
| 3,838
|
eng_Latn
|
eng_Latn
| 0.990916
|
eng_Latn
| 0.994114
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
1903,
5178,
8847
] |
Members Present: Mark Batkie, Dale Schoen, Gary Fetting, Al Stoutenburg, William Dixon and Sheila Coats, also present Zoning Administrator, Richard Honaman.
Members Absent: Amanda Aldrich
Guests: Robert Eggers of Spicer Group.
Meeting called to order at 6:10 pm by Gary Fetting, Vice Chairman, Al Stoutenburg arrived a few minutes later. All present rose and recited the Pledge of Allegiance.
Agenda: No additions or corrections.
Minutes: William Dixon made a motion to approve the September 15, 2016 minutes, support by Mark Batkie, motion carried.
Business before the board is 4 items to go over prior to completion of Master Plan:
1. Revised version of Goals and Objectives.
2. Future Land Use Map, add multi-use paths to Parks and Recreation.
3. Master Plan questions, need different objectives for DNR land use, possibly Parks and Recreation. Land use, what would it take to get M-19 as a bicycle route Gary Fetting inquired, would require working with MDOT from Sandusky to Peck.
4. Completion Steps
Response to item #1: Bill Dixon commented on need for better high speed internet and cellular towers for better service throughout the community. Some Townships provide internet to all residents. E-commerce is the future. We have lower wages to offer, last in State of Michigan to get these services. Need to take the position of making internet and updated communication services available to all Township residents and businesses.
Response to item #2: Future Land Use Map, guides how you may zone land in the future. Shorten up Gates Rd to back of Walmart and add Miller Road to the East on South Side of Miller Rd and North Side after Holy Redeemer church and both sides of Stoutenburg/Campbell Road to commercial. M-19 South to Cooper:
2: Single Family Residential
3: Same
4: Watertown Area Same
5: Single Family Residential
Response to item #3: Take out 20% ownership and keep, over 90 are connected, no expansion not considered. 2. Yes, 3. Summer 2015 tax bill, 4. Mailed with tax bill, 5. Peat – all been harvested (permit is no longer active).
Response to item #4: Went over timing of approving Master Plan. Robert is going to e-mail to Sheila Coats with check off dates when all items are due.
Al Stoutenburg asked if there were any other business before board. No response. Motion made to adjourn by William Dixon, support by Gary Fetting, motion carried.
Meeting adjourned at 7:15PM.
Respectfully submitted:
Sheila Coats
Watertown Township Planning Commission
|
<urn:uuid:b34af69d-fbae-4171-9459-d4e7e77db32a>
|
CC-MAIN-2019-39
|
http://watertowntownship.net/media/uploads/docs/November_9_2016.pdf
|
2019-09-18T20:51:21Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573331.86/warc/CC-MAIN-20190918193432-20190918215432-00056.warc.gz
| 206,868,815
| 569
|
eng_Latn
|
eng_Latn
| 0.992163
|
eng_Latn
| 0.991145
|
[
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
1843,
2491
] |
Dear
Information requested FOI ATISN 16588
Thank you for your request which we received on 4 August 2022.
You asked for:
Sources of evidence being used to inform policy on elective home educators in Wales
Our response
From our preliminary assessment we estimate that it will cost more than the appropriate limit set out in the Freedom of Information and Data Protection (Appropriate Limit and Fees) Regulations 2004 to answer your request. The appropriate limit specified for central government is £600. This represents the estimated cost of it taking over 24 hours of time to determine whether we hold the information and to thereafter locate, retrieve and extract it.
In order to provide you with the information that you have requested would require carrying out an examination (as described below) of in excess of 5,000 documents. Consequently, we have decided not to provide you with the information you have requested.
We have reviewed our electronic files and have identified potentially 5,000 plus documents that may contain this information. We have estimated that it would take an officer approximately 5 mins to open each document, review its contents to identify if it contains the information you seek and to mark it for disclosure. This process does not take into account the time taken to redact any document as appropriate or seek 3rd party approval for disclosure. This would mean that this process would take 5,000 by 5 mins equalling 416 hours. Section 12 of FOIA allows the Welsh Government to refuse a request for general information in circumstances where it estimates that it would exceed the "appropriate limit" to either comply with the request. The appropriate limit is currently set at £600 for the Welsh Government which is calculated on staff taking more than 24 hours (at a standard rate of £25 per hour) to comply with the request.
Therefore as processing this request would exceed the appropriate limit for handling this request, we are unable to provide this information.
You may wish to refine your request by narrowing its scope by being more specific about what information you particularly wish to obtain, including any dates or period of time relevant to the information required. If you do refine your request in this way, this will be treated as a new request.
Next steps
If you are dissatisfied with the Welsh Government's handling of your request, you can ask for an internal review within 40 working days of the date of this response. Requests for an internal review should be addressed to the Welsh Government's Freedom of Information Officer at:
Information Rights Unit, Welsh Government, Cathays Park, Cardiff, CF10 3NQ
or Email: [email protected]
Please remember to quote the ATISN reference number above.
You also have the right to complain to the Information Commissioner. The Information Commissioner can be contacted at:
Information Commissioner's Office,
Wycliffe House, Water Lane, Wilmslow, Cheshire, SK9 5AF.
However, please note that the Commissioner will not normally investigate a complaint until it has been through our own internal review process.
Yours sincerely
|
<urn:uuid:ae7b8de4-0cc2-409b-ada1-71c685bbdf27>
|
CC-MAIN-2024-18
|
https://www.gov.wales/sites/default/files/publications/2022-09/atisn16588.pdf
|
2024-04-13T17:00:38+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-18/subset=warc/part-00231-29538f81-5664-4df2-acb6-7d8ba3d2a1aa.c000.gz.parquet
| 758,204,768
| 627
|
eng_Latn
|
eng_Latn
| 0.995834
|
eng_Latn
| 0.996167
|
[
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2315,
3163
] |
Flight Date: _____________
Weight And Balance
Weight Arm Moment/1000
Basic Empty Weight
Pilot & Front Passenger
Second Row Passengers
Nacelle Baggage
Aft Cabin Baggage
Baggage Door Baggage
Zero Fuel Weight
=
CG =
Main Fuel _____ Gals
Aux Fuel _____ Gals
Takeoff Weight
=
CG =
Fuel Burn _____ Gals
Landing Weight
=
Weather
□ METAR & TAF
Pressure Altitude__________
current/maximum
□ FA
Temperature __________
current/maximum
□ Surface analysis Chart
Density Altitude __________
□ Winds/Temps Aloft
Prevailing Wind __________
□ Significant Weather Prog. Chart
Cross Wind Comp.________
□ Radar Summary/Convective outlook chart
□ PIREPS
□ NOTAMS
□ TFR's
Notes____________________________________________________________
Aircraft Status
□ Annual
□ VOR
□ 100/Phase □ AD's
□ Transponder □ ELT
□ Static/Altimeter □ Air Worthiness
□ Registration
Departure ATIS _____________________________________________
Notes_______________________________________________________________
Takeoff Performance
T/O Distance_______ Headwind/Crosswind Comp.__________
Runway Length (T/Ox1.5)_________
Take off Distance- 50'___________Req. Distance 50' (x1.5)________________
T/O Distance (short)__________ Req Runway Short (short T/Ox 1.5)________
Accelerate/Stop Distance (t/o ground roll+landing ground rollx1.2) N/A
V
X
____ V
Y
____ V
r
____ V
Rshort
______ V
a
____
Time In Fuel Tanks___________
Note: T/O Distance (short) is to be used when the AFM/POH has different charts for short and normal takeoffs.
Arrival ATIS ____
_______________________________________________
Landing Performance
Landing Weight_______ Headwind/Crosswind Comp._________
Landing Distance __________Runway Required (ldg. Distance x 1.5)_________
Landing Distance over 50' Obst.________________(x1.5)_____________
V
REF
____ V
REF Flaps 0 _____
V
REF/Short
____ V
Best Glide
____
Notes_______________________________________________________________
|
<urn:uuid:66388ba3-5689-4d20-ba8a-62ba5ee4abec>
|
CC-MAIN-2018-51
|
http://mitchellflight.com/wp-content/uploads/2018/02/TOLD-Card.pdf
|
2018-12-19T07:30:39Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376831715.98/warc/CC-MAIN-20181219065932-20181219091932-00023.warc.gz
| 184,122,920
| 507
|
eng_Latn
|
eng_Latn
| 0.590141
|
eng_Latn
| 0.590141
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
1990
] |
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL
MUNICIPAL YEAR 2015-2016
DEVELOPMENT CONTROL COMMITTEE 5 NOVEMBER 2015
Agenda Item No.14
INFORMATION FOR MEMBERS, PERTAINING TO ACTION TAKEN UNDER DELEGATED POWERS
REPORT OF: SERVICE DIRECTOR PLANNING
1. PURPOSE OF THE REPORT
To inform Members of the following, for the period 02/10/2015 and 21/10/2015.
No Planning and Enforcement Appeals Decisions Received.
Delegated Decisions Approvals and Refusals with reasons. No Overview of Enforcement Cases. No Enforcement Delegated Decisions.
2. RECOMMENDATION
That Members note the information.
LOCAL GOVERNMENT ACT 1972 as amended by LOCAL GOVERNMENT (ACCESS TO INFORMATION) ACT 1985 RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL LIST OF BACKGROUND PAPERS DEVELOPMENT CONTROL COMMITTEE 5 NOVEMBER 2015
REPORT OF: SERVICE DIRECTOR PLANNING
REPORT
OFFICER TO CONTACT
INFORMATION FOR MEMBERS, Mr. J. Bailey PERTAINING TO ACTION TAKEN (Tel. 01443 425004) UNDER DELEGATED POWERS
See Relevant Application File
Development Control : Delegated Decisions (Permissions) between:
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL
Report for Development Control Planning Committee
Hirwaun
15/1149/01
09/10/2015
Proposal:
Metalwork hanging painted sign.
Location: 40 & 41 HIGH STREET, HIRWAUN, ABERDARE, CF44 9SW
Decision Date:
Aberdare West/Llwydcoed
15/0557/09
Decision Date:
Proposal:
Location:
15/1139/10
Proposal:
Location:
Cwmbach
15/1013/10
Proposal:
Location:
15/1192/10
Proposal:
07/10/2015
Single storey extension / internal alterations at the above property required in order to enhance existing kitchen / dining facilities. Proposed floor area 11 sq metres.
55 POTTERS FIELD, TRECYNON, ABERDARE, CF44 8HX
Decision Date: 14/10/2015
Replacement of wooden shed at rear of property.
10 CLIVE STREET, TRECYNON, ABERDARE, CF44 8PE
Decision Date: 09/10/2015
Extend back and front of garage so it is full depth of the house, including front kitchen extension. Replace current flat roof with sloping tiled roof.
71 PINECROFT AVENUE, CWMBACH, ABERDARE, CF44 0NB
Decision Date: 19/10/2015
Erect bay window to the front elevation.
Location: 62 PINECROFT AVENUE, CWMBACH, ABERDARE, CF44 0NB
Mountain Ash West
15/0941/10
09/10/2015
Proposal:
Garage conversion into a bedroom.
Location: 1 FOREST VIEW, MOUNTAIN ASH, CF45 3DU
Decision Date:
235
02/10/2015 and 21/10/2015
02/10/2015 and 21/10/2015 Development Control : Delegated Decisions (Permissions) between:
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL
Report for Development Control Planning Committee
Development Control : Delegated Decisions (Permissions) between:
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL
02/10/2015 and 21/10/2015
Report for Development Control Planning Committee
Treherbert
15/0812/10
02/10/2015
Proposal:
Single dwelling on site of domestic garage associated with existing manor house.
Location: FERNHILL, CASTLETON AVENUE, TYNEWYDD, TREHERBERT, TREORCHY, CF42 5SS
Decision Date:
15/1095/01
05/10/2015
Proposal:
2 x Internally Illuminated Fascia sign, 1 x Non Illuminated ACM Panel and 1 x Non Illuminated Service Menu Board
Location:
THE CO OPERATIVE PHARMACY, WILLIAM STREET, TYNEWYDD, TREHERBERT, TREORCHY, CF42 5JJ
Decision Date:
Treorchy
15/1184/08
16/10/2015
Proposal:
Installation of steel framed canopy over entrance / exit to upper floor.
Location: PARC PRIMARY SCHOOL, TALLIS STREET, CWMPARC, TREORCHY, CF42 6LY
Decision Date:
Ystrad
15/1050/10
09/10/2015
Proposal:
Proposed detached dwelling with integral garage (Amendment to consent ref: P/13/0028/10).
Location: LAND ADJACENT TO ARFRYN, PENRHYS ROAD, YSTRAD, PENTRE, CF41 7SW
Decision Date:
Cwm Clydach
15/1018/10
19/10/2015
Proposal:
Demolition of existing shed and replace with new garage.
Location: 18 ADAMS STREET, CLYDACH, TONYPANDY, CF40 2DU
Decision Date:
Penygraig
15/1163/01
09/10/2015
Proposal:
1 x Non illuminated fascia sign, 1 x Internally illuminated projecting sign and 1 x Window vinyl graphics
Location: THE CO OPERATIVE PHARMACY, 62 TYLACELYN ROAD, PENYGRAIG, TONYPANDY, CF40 1JU
Decision Date:
Development Control : Delegated Decisions (Permissions) between:
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL
02/10/2015 and 21/10/2015
Report for Development Control Planning Committee
Porth
15/1092/10
09/10/2015
Proposal:
2 no. existing external ATM's replaced with newer model ATM's and associative works.
Location: HSBC, 78 HANNAH STREET, PORTH, CF39 9RE
Decision Date:
15/1111/01
09/10/2015
Proposal:
Non-illuminated signage.
Location: HSBC, 78 HANNAH STREET, PORTH, CF39 9RE
Decision Date:
15/1114/10
21/10/2015
Proposal:
Construction of hard standing to rear of property.
Location: 29 ALDERGROVE ROAD, PORTH, CF39 0LP
Decision Date:
Cymmer
15/1112/10
13/10/2015
Proposal:
Single storey side and rear extensions, with associated steps, retaining wall and driveway.
Location: O'R DIWEDD, 1 PLEASANT VIEW, TREHAFOD, PONTYPRIDD, CF37 2NT
Decision Date:
Ynyshir
15/0756/10
05/10/2015
Proposal:
Elevated rear decked platform. (Amended plans received 01/09/15)
Location: 47 UPPER GYNOR PLACE, YNYSHIR, PORTH, CF39 0NW
Decision Date:
Tylorstown
15/1181/10
21/10/2015
Proposal:
External vertical lift.
Location: 25 DERI TERRACE, TYLORSTOWN, FERNDALE, CF43 3NB
Decision Date:
Glyncoch
15/1193/10
19/10/2015
Proposal:
Erect conservatory to the rear elevation.
Location: 21 CONWAY CLOSE, GLYNCOCH, PONTYPRIDD, CF37 3AW
Decision Date:
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL 02/10/2015 and 21/10/2015 Development Control : Delegated Decisions (Permissions) between: Development Control Committee Agenda - 5 November 2015
Report for Development Control Planning Committee
Town (Pontypridd)
15/0883/12
06/10/2015
Proposal:
Replacement of existing ATM and internal works to remove non-structural partitions for replacement in different locations and associated decoration.
Location: NATWEST, 1-3 TAFF STREET, PONTYPRIDD, CF37 4UU
Decision Date:
15/1214/10
19/10/2015
Proposal:
Construct new front and rear facing dormers in roof
Location: 49 WHITEROCK AVENUE, GRAIGWEN, PONTYPRIDD, CF37 2EL
Decision Date:
Rhydyfelin Central
15/0774/10
15/10/2015
Proposal:
Rear single storey extension.
Location: DWYN AFAL, DYNEA CLOSE, RHYDYFELIN, PONTYPRIDD, CF37 5EG
Decision Date:
15/0887/10
07/10/2015
Proposal:
External alterations to 3 no. apartment buildings, including the replacement of rendering, windows, fascias, rainwater goods and roofing; the creation of a new porch; the erection of 3 no. refuse stores; and the erection
Location: 48-58, 60-70, 72-82 SHAKESPEARE RISE, RHYDYFELIN, PONTYPRIDD, CF37 5HA
Decision Date:
Hawthorn
15/1158/10
19/10/2015
Proposal:
2 storey rear extension.
Location: 12 POPLAR ROAD, RHYDYFELIN, PONTYPRIDD, CF37 5LR
Decision Date:
Ffynon Taf
15/1206/01
16/10/2015
Proposal:
Internally illuminated advert sign to front elevation (retrospective).
Location:
SHOWCASE CINEMAS, HEOL YR ODYN, TREFOREST INDUSTRIAL ESTATE, TAFFS WELL, CARDIFF, CF15 7QX
Decision Date:
Development Control : Delegated Decisions (Permissions) between:
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL
02/10/2015 and 21/10/2015
Report for Development Control Planning Committee
Llantwit Fardre
15/1035/10
08/10/2015
Proposal:
Two storey rear extension incorporating balcony and single storey side extension (Amendment to planning permission 15/0215/10)
Location: 6 HEOL-Y-FFYNNON, EFAIL ISAF, PONTYPRIDD, CF38 1AU
Decision Date:
15/1087/10
09/10/2015
Proposal:
Two storey side extension.
Location: 36 QUEEN'S DRIVE, LLANTWIT FARDRE, PONTYPRIDD, CF38 2NT
Decision Date:
15/1157/10
12/10/2015
Proposal:
Single storey extension to rear with lantern roof and first floor extension to side
Location: 35 PARC NANT CELYN, EFAIL ISAF, PONTYPRIDD, CF38 1AD
Decision Date:
Church Village
15/1162/01
19/10/2015
Proposal:
1 x Internally illuminated fascia sign, 1 x Internally illuminated projecting sign.
Location: THE CO OPERATIVE PHARMACY, 1 MAIN ROAD, CHURCH VILLAGE, PONTYPRIDD, CF38 1PY
Decision Date:
15/1176/10
13/10/2015
Proposal:
Two storey side extension to existing property.
Location: 10 HEOL-Y-FRO, CHURCH VILLAGE, PONTYPRIDD, CF38 1UD
Decision Date:
Tonteg
15/1085/10
Proposal:
Location:
15/1156/01
Proposal:
19/10/2015
Decision Date:
Refurbishment of an existing retail unit and incorporating new w.c. and office facilities. Retaining self-contained flat over (upper levels).
18 MAIN ROAD, TONTEG, PONTYPRIDD, CF38 1PN
Decision Date: 05/10/2015
1 x Internally illuminated fascia sign, 1 x Non illuminated fascia sign and 1 x Internally illuminated tray sign
Location: THE CO OPERATIVE PHARMACY, CHURCH ROAD, TONTEG, PONTYPRIDD, CF38 1EG
Gilfach Goch
15/1182/01
21/10/2015
Proposal:
2 x Externally illuminated fascia signs and 4 x Window vinyl graphics
Location: CWM GWYRDD MEDICAL CENTRE, SWN-YR-AFON, GILFACH GOCH, PORTH, CF39 8SX
Decision Date:
02/10/2015 and 21/10/2015 Development Control : Delegated Decisions (Permissions) between: Report for Development Control Planning Committee
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL
Tonyrefail East
15/0997/10
13/10/2015
Proposal:
2 storey extension to side. (Amended plans received 23/09/2015)
Location: 3 THE MEADOWS, COEDELY, TONYREFAIL, PORTH, CF39 8BS
Decision Date:
15/1100/01
07/10/2015
Proposal:
2 x Internally illuminated fascia sign 1 x Internally illuminated projecting sign
Location: THE CO OPERATIVE PHARMACY, PARK LANE, TONYREFAIL, PORTH, CF39 8AF
Decision Date:
Beddau
15/1077/01
14/10/2015
Proposal:
1 x Internally Illuminated Fascia sign and 1 x Non Illuminated Window Vinyl (Amended location plan received 24/08/15)
Location:
UNIT 2 THE CO OPERATIVE PHARMACY, COMMON APPROACH, GWAUNMISKIN ROAD, BEDDAU, PONTYPRIDD, CF38 2BL
Decision Date:
Town (Llantrisant)
15/0634/10
02/10/2015
Proposal:
Installation /erection of a woodframed and clad garden shed with felt roof
Location: 9 CHURCH STREET, LLANTRISANT, PONTYCLUN, CF72 8EW
Decision Date:
15/0975/10
09/10/2015
Decision Date:
Proposal:
Location:
Erection of a self contained pre-manufactured office building
EAST CAERLAN FARM, NEWBRIDGE ROAD, LLANTRISANT, PONTYCLUN, CF72 8EX
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL Development Control Committee Agenda - 5 November 2015
02/10/2015 and 21/10/2015
Development Control : Delegated Decisions (Permissions) between:
Report for Development Control Planning Committee
Talbot Green
15/0792/10
19/10/2015
Proposal:
Change of use for eight parking spaces to hand car wash and valeting operation, including installation of an office and erection of a canopy.
Location:
TESCO EXTRA, NEWPARK DISTRICT SHOPPING CENTRE, TALBOT GREEN, PONTYCLUN, CF72 8RB
Decision Date:
15/0793/01
19/10/2015
Proposal:
Advertisement of the proposed hand car wash and valeting service.
Location:
TESCO EXTRA, NEWPARK DISTRICT SHOPPING CENTRE, TALBOT GREEN, PONTYCLUN, CF72 8RB
Decision Date:
15/1027/10
21/10/2015
Proposal:
Operational Development including screening and erection of timber decking.
Location: LA LUNA RESTAURANT, 79-81 TALBOT ROAD, TALBOT GREEN, PONTYCLUN, CF72 8AE
Decision Date:
15/1078/10
05/10/2015
Proposal:
Erection of air conditioning condenser units on the rear wall of the building exterior
Location: POUNDLAND, GLAMORGAN VALE RETAIL PARK, TALBOT GREEN, PONTYCLUN, CF72 8RP
Decision Date:
Pontyclun
15/1167/09
Proposal:
Location:
15/1205/09
Proposal:
Location:
14/10/2015
Decision Date:
Rear extension to form single storey family room.
105 YNYSDDU, PONTYCLUN, CF72 9UE
Decision Date: 14/10/2015
Single storey rear extension
CAMERON HOUSE, COWBRIDGE ROAD, TALYGARN, PONTYCLUN, CF72 9JU
Llanharry
15/1183/10
19/10/2015
Proposal:
Two storey side extension and one storey rear extension with velux roof windows. Dwarf wall at front and replace side timber fence with new brickwork wall, with timber panel insert.
Location: 11 CLOS GWERNEN, LLANHARRY, PONTYCLUN, CF72 9GH
Decision Date:
Brynna
15/1152/15
21/10/2015
Proposal:
Remove or vary a condition relating to application 14/0651/10 to continue with dog grooming parlour business on a permanent basis to Monday to Friday 09:30 to 17:00 hours.
Location: 14 WOODFIELD STREET, LLANHARAN, PONTYCLUN, CF72 9RT
Decision Date:
Development Control : Delegated Decisions - Refusals between:
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL
02/10/2015 and 21/10/2015
Report for Development Control Planning Committee
Aberdare West/Llwydcoed
15/1093/13
19/10/2015
Proposal:
Construction of a total of 8 no. 3 bedroom dwellinghouses (3 No. 3 storey townhouses, 4 No. (2 pairs) 2 storey semi-detached houses and 1 No. 2 storey detached house).
Location: ROBERTSTOWN NURSERY SCHOOL, PHILLIP STREET, ROBERTSTOWN, ABERDARE, CF44 8ET
Decision Date:
Reason:
The planning application proposes highly vulnerable development, housing, within Zone C2 of the Development Advice Map (DAM) contained in TAN15. The Flood Consequence Assessment fails to demonstrate that the risks and consequences of flooding can be managed, contrary to the requirements of Policy AW10 of the Rhondda Cynon Taf Local Development Plan.
1
Reason:
Insufficient information has been submitted to prove that a residential development on the would not have a detrimental impact on the ecological value and natural heritage of the area, contrary to the requirements of policies AW5 and AW8 of the Rhondda Cynon Taf Local Development Plan. 2
Mountain Ash West
15/1130/10
Proposal:
Location:
Reason:
21/10/2015
Decision Date:
Change of use from garden store to self-contained, one bedroom dwelling incorporating a two storey side extension and first floor extension over the existing.
LAND TO THE REAR OF 49-50 FOREST VIEW, GLENBOI, MOUNTAIN ASH, CF45 3DU
The proposed development by reason of its scale and proximity to the neighboring property to the west (no. 49 Forest View), would result in an overbearing form of development to the detriment of the level of residential amenity currently enjoyed by those occupiers. As such the proposal is considered to be contrary to policy AW5 of the Rhondda Cynon Taf Local Development Plan and Planning Policy Wales.
1
Reason:
The proposed development, by reason of its design and external appearance, would result in a form of development which would be out of keeping with the established character of the street scene. As such the proposal is considered to be contrary to policy AW5 of the Rhondda Cynon Taf Local Development Plan and Planning Policy Wales.
2
Reason: The application site lies within an area that is defined as being a Development High Risk Area for Coal Mining. Insufficient information has been provided to accurately assess the potential risks associated with the coal mining features and hazards which may be present on site. As such, the proposed development would be contrary to policy AW10 of the Rhondda Cynon Taf Local Development Plan and Planning Policy Wales. 3
Development Control : Delegated Decisions - Refusals between:
RHONDDA CYNON TAF COUNTY BOROUGH COUNCIL
02/10/2015 and 21/10/2015
Report for Development Control Planning Committee
Aberaman South
15/0656/10
21/10/2015
Proposal: Change of use from garage to bedsit.
Location: YR HEN BECWS, REAR OF 16 FFORCHAMAN ROAD, CWMAMAN, ABERDARE, CF44 6NS
Decision Date:
Reason:
The proposed development is considered to be contrary to policy AW5 of the Rhondda Cynon Taf Local Development Plan as it would result in an adverse impact upon pedestrian and highway safety in the vicinity of the application site for the following reasons:
The proposed development will generate additional vehicular movements along the sub-standard street in terms of visibility with lack of turning area resulting in multiple reversing movements to and from Fforchaman Road to the detriment of safety of all highway users and free flow of traffic.
In the absence of parking provision the proposal would create additional on-street parking demand to the detriment of safety of all highway users and free flow of traffic.
1
Llantwit Fardre
15/0923/13
05/10/2015
Proposal: Outline application for a single dwelling house adjacent to No. 2 Bryn Villa.
Location: BRYN VILLA, 2 LLANTRISANT ROAD, LLANTWIT FARDRE, CF38 2HA
Decision Date:
Reason: The development, as a result of its siting, scale and height, would have an unacceptable detrimental impact
upon the levels of amenity and privacy currently enjoyed by residents of the immediate neighbouring property Melrose arising from overbearing, overshadowing and overlooking. As such, the proposal is
contrary to Policies AW5 and AW6 of the Rhondda Cynon Taf Local Development Plan.
1
Reason:
The proposed development is considered to be contrary to policy AW5 of the Rhondda Cynon Taf Local Development Plan as it would result in an adverse impact upon highway safety in the vicinity of the application site for the following reasons: 2
The proposed development would remove the potential for no. 2 Bryn Villa to provide off-street parking and would result in additional on-street parking by calling, service and delivery vehicles to the detriment of safety of highway users and the free flow of traffic on a classified route (B4595) which is also a bus route.
Total Number of Delegated decisions is 4
|
<urn:uuid:416a9766-422b-4607-ba1b-d766619525fa>
|
CC-MAIN-2022-49
|
https://www.rctcbc.gov.uk/EN/Council/CouncillorsCommitteesandMeetings/Meetings/PlanningandDevelopmentCommittee/2015/11/05/Reports/InformationReport.pdf
|
2022-12-03T13:08:35+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2022-49/subset=warc/part-00094-a0906200-461b-4808-9b94-6c53daf73f61.c000.gz.parquet
| 1,002,061,850
| 5,105
|
eng_Latn
|
eng_Latn
| 0.735985
|
eng_Latn
| 0.899079
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
591,
1042,
2429,
2614,
4157,
5533,
7127,
9040,
10321,
12419,
15112,
17459
] |
Fish, crayfish & mussels in environmental DNA
Laboratory analyses & results.
Rodrigo Esparza-Salas
Centre for Genetic Identification/Swedish Museum of Natural History
December 2014
Objectives
• Optimize sampling protocols
• Use available NGS methods for Fish DNA barcoding
• Develop simple methods for the detection of crayfish
• Develop methods for the detection of large mussel species in parallel (NGS)
• Develop NGS protocols for the correct identification of cyprinid fish
Environmental DNA
Environmental DNA
Naturhistoriska riksmuseet
DNA extraction
• Potential problems
– Amount of recovered DNA
– Inhibiting compounds in DNA sample (minerals, salts, proteins)
– Sample cross-contamination
MoBio Power Water DNA isolation kit
Barcoding genes
- Mitochondrial DNA
- 16s
- Cytochrome Oxidase I (COI)
- Cytochrome B
- ND2, etc.
- Nuclear DNA
- 18s
- ITS
- Etc
Choice of DNA markers
- Next-generation sequencing
- Fish
- 300 base pair long section of 16s rDNA gene
- Mussels
- 170 base pair section of 16s rDNA
- Crayfish
- 170bp species-specific sectin of COI
Choice of DNA markers
Conserved region (PCR primer)
Variable region (Target sequence)
Conserved region (PCR primer)
Polymerase chain reaction
40 PCR cycles → $2^{40}$ copies
(20000000000000000000000000000000000000000000000000000000000)
PA - PA
Plecostacus N. Antonius
• Pyrosequencing for Fish and mussels
• PCR + gel electrophoresis for crayfish
| Fish Species | Percentage |
|-------------------|------------|
| Silakka | 0.31 |
| Kivinikka | 0.10 |
| Ahven | 0.08 |
| Kuha | 0.06 |
| Siika/Muikku | 0.06 |
| Kilohaili | 0.06 |
| Lahna | 0.06 |
| Kolmipiikki | 0.04 |
| Kuore | 0.04 |
| Särki/Sorva | 0.04 |
| Lohi | 0.02 |
| Turska | 0.02 |
| Made | 0.02 |
Some results
• Fish DNA
– Positive PCR product in 12/55 samples for first marker
– Non-specific amplification for second marker
• Mussel DNA
– Positive PCR products in 13/55 samples
• Crayfish DNA
– Negative
Mussel PCR ~170 bp
Next-generation sequencing
• First attempt using fish and Mussel PCR products
– ~84,000 total DNA sequences
– 66% low quality reads
– 30% adaptor-dimers (non-specific)
– 0.06% target sequences
• Other non-target organism DNA
– Bacteria, microalgae, protozoans, vertebrates, crustaceans, annelids,
Next steps (2014)
• Re-sequencing with modified protocol for NGS
– PCR reaction
– Selection of target PCR products
• Develop a specific marker for Zebra mussel (Dreissena polymorpha)
– test with field samples
Next steps (2015)
| | Illumina MiSeq | IonTorrent PGM | Roche GS Junior |
|----------------------|----------------|----------------|-----------------|
| Instrument price | | x | |
| Read length | | | x |
| Throughput | x | | |
| Run time | | x | |
| Price/run | | x | |
| Hands-on time | x | | |
| Read quality | x | | |
| Assembly: coverage | | | x |
| Assembly: fewest pieces | | | x |
| Assembly: gene space | x | | |
Reads 24 M 100 000
Sampling recommendations
• Double filtration protocol
– Pre-filtration (e.g. glass-fiber filter)
– Second filtration with 0.22 micrometer membrane
Sampling recommendations
Targeted sampling to maximise DNA recovery
Objectives
• Optimize sampling protocols
• Use available NGS methods for Fish DNA barcoding
• Develop simple methods for the detection of crayfish
• Develop methods for the detection of large mussel species in parallel (NGS)
• Develop NGS protocols for the correct identification of cyprinid fish
|
5a2796bb-3789-4c89-b9f4-bdfce8a463d5
|
CC-MAIN-2024-10
|
https://www.slu.se/globalassets/ew/org/inst/aqua/externwebb/genetik/fish-crayfish-and-mussels-as-edna_lab-results_rodrigo.pdf
|
2024-03-01T07:49:51+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-10/subset=warc/part-00220-d9675c6d-5c8d-45bb-9c98-c56e42022a4d.c000.gz.parquet
| 977,500,955
| 1,062
|
eng_Latn
|
eng_Latn
| 0.419982
|
eng_Latn
| 0.402016
|
[
"eng_Latn",
"lvs_Latn",
"unknown",
"unknown",
"eng_Latn",
"por_Latn",
"eng_Latn",
"dan_Latn",
"unknown",
"unknown",
"dan_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"lvs_Latn"
] | true
|
docling
|
[
182,
481,
500,
547,
748,
895,
1103,
1223,
1345,
1379,
1460,
1987,
2227,
2537,
2755,
3718,
3868,
3938,
4237
] |
Fitzgerald And Kingsley Electric Machinery 7th Edition
DOWNLOAD
ELECTRIC MACHINERY, 7TH EDITION, CHARLES KINGSLEY, STEPHEN ...
electric machinery, 7th edition ... electric machinery, 7th edition 7th ... this seventh edition of fitzgerald and kingsley's electric machinery by stephen umans ...
Sun, 08 Aug 2010 23:54:00 GMT
FITZGERALD & KINGSLEY'S ELECTRIC MACHINERY: STEPHEN UMANS ...
fitzgerald & kingsley's electric machinery ... this seventh edition of fitzgerald and kingsley's electric machinery by stephen umans was developed ... 7th edition ...
Sun, 27 Jan 2013 23:57:00 GMT
FITZGERALD AND KINGSLEY ELECTRIC MACHINERY 7TH EDITION
fitzgerald and kingsley electric machinery 7th edition fitzgerald and kingsley electric machinery 7th edition - title ebooks : fitzgerald and kingsley
Thu, 11 May 2017 06:58:00 GMT
FITZGERALD AND KINGSLEY'S ELECTRIC MACHINERY; 7TH EDITION ...
synopsis: this seventh edition of fitzgerald and kingsley's electric machinery by stephen umans was developed recognizing the strength of this classic text since its ...
Thu, 21 May 2009 23:58:00 GMT
FITZGERALD & KINGSLEY'S ELECTRIC MACHINERY 7TH EDITION BY ...
fitzgerald & kingsley's electric machinery 7th edition by stephen umans (author) isbn-13: 978-0073380469. college textbooks
Fri, 28 Apr 2017 03:24:00 GMT
FITZGERALD+KINGSLEY ELECTRIC MACHINERY 7TH EDITION ...
buy fitzgerald+kingsley electric machinery 7th edition ... this seventh edition of fitzgerald and kingsley's electric machinery by stephen umans was developed ...
Mon, 10 Apr 2017 12:57:00 GMT
ELECTRIC MACHINERY, 7TH EDITION EBOOK: CHARLES KINGSLEY ...
electric machinery, 7th edition ebook: charles kingsley, stephen umans, a fitzgerald: amazon: kindle store
Sat, 13 Feb 2016 04:07:00 GMT
FITZGERALD KINGSLEYAPOSS ELECTRIC MACHINERY 7TH EDITION
fitzgerald kingsleyaposs electric machinery 7th edition fitzgerald kingsleyaposs electric machinery 7th edition -
Fri, 12 May 2017 05:31:00 GMT
title ebooks : fitzgerald kingsleyaposs
FITZGERALD & KINGSLEY'S ELECTRIC MACHINERY 7TH EDITION ...
this seventh edition of fitzgerald and kingsley's electric machinery by stephen umans was developed recognizing the strength of this classic text since its first ...
Sat, 13 May 2017 02:02:00 GMT
FITZGERALD & KINGSLEY'S ELECTRIC MACHINERY - MHEDUCATION
Fri, 12 May 2017 13:23:00 GMT
fitzgerald & kingsley's electric machinery ... 7th edition • 720 pages • ... features; this seventh edition of fitzgerald and kingsley's electric machinery by ...
FITZGERALD KINGSLEY APOS S ELECTRIC MACHINERY 7TH EDITION
related fitzgerald kingsley apos s electric machinery 7th edition free ebooks - advanced accounting by dayag solution manual image processing multiple
Mon, 08 May 2017 13:35:00 GMT
ELECTRIC MACHINERY: SEVENTH EDITION - STEPHEN UMANS, A ...
this seventh edition of fitzgerald and kingsley's electric machinery by stephen ... performance of electric ... edition of fitzgerald and kingsley's electric ...
Mon, 08 May 2017 13:50:00 GMT
ELECTRIC MACHINERY 6TH EDITION (9780073660097 ...
buy electric machinery 6th edition (9780073660097) ... fitzgerald+kingsley electric machinery - 7th edition isbn13: 978-0073380469. about textbooks; about us;
Thu, 29 Dec 2016 20:20:00 GMT
FITZGERALD AND KINGSLEYS ELECTRIC MACHINERY 7TH EDITION ...
fitzgerald & kingsley's electric machinery 7 th edition. by stephen umans ... see all buying options. fitzgerald & kingsley's electric machinery7 th edition. by ...
Thu, 11 May 2017 15:48:00 GMT
ELECTRIC MACHINERY, 7TH EDITION EBOOK: CHARLES KINGSLEY ...
electric machinery, 7th edition ebook: charles kingsley, stephen umans, a fitzgerald: amazon: kindle store
Sat, 06 May 2017 22:27:00 GMT
7TH EDITION TEXTBOOK SOLUTIONS | CHEGG
access 7th edition solutions now. our solutions are written by chegg experts so you can be assured of the highest ... charles kingsley, stephen umans, a fitzgerald:
Tue, 09 May 2017 16:47:00 GMT
ELECTRIC MACHINERY FITZGERALD SOLUTIONS 7TH - BING - JUST PDF
electric machinery fitzgerald solutions 7th.pdf ... fitzgerald & kingsley's electric machinery: ... this seventh edition of fitzgerald and kingsley's electric ...
Wed, 10 May 2017 05:40:00 GMT
FITZGERALD AND KINGSLEY ELECTRIC MACHINERY 7TH EDITION ...
fitzgerald and kingsley electric machinery 7th edition introduction
Tue, 09 May 2017 08:05:00 GMT
thisparticularfitzgeraldandkingsleyelectricmachinery7theditionpdfstartwithintroduction,briefsession
ELECTRIC MACHINERY BY A. E. FITZGERALD,CHARLES KINGSLEY ...
electric machinery by a. e. fitzgerald,charles kingsley, ... sixth edition. posted by ... electric machinery by a. e. fitzgerald,charles ki...
Fri, 28 Apr 2017 08:46:00 GMT
FITZGERALD & KINGSLEY'S ELECTRIC MACHINERY 7TH EDITION ...
fitzgerald & kingsley's electric machinery; fitzgerald & kingsley's electric machinery. by stephen umans. ... most international edition has different isbn and cover ...
Mon, 08 May 2017 08:13:00 GMT
FREE DOWNLOAD HERE - PDFSDOCUMENTS2
Wed, 26 Apr 2017 19:47:00 GMT
electric machinery 7th edition fitzgerald solution manual.pdf free download here electric machinery 7th edition fitzgerald ... fitzgerald kingsley electric machinery ...
|
<urn:uuid:a82dd770-8cb4-4bee-b9a8-d675809e707c>
|
CC-MAIN-2017-26
|
http://1007.twtalkgo.info/fitzgerald-and-kingsley-electric-machinery-7th-edition.pdf
|
2017-06-25T20:54:44Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320582.2/warc/CC-MAIN-20170625203122-20170625223122-00550.warc.gz
| 316,054
| 1,539
|
eng_Latn
|
eng_Latn
| 0.949359
|
eng_Latn
| 0.944582
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
rolmOCR
|
[
2353,
5035,
5206
] |
April 15, 2019
Materials Licensing Branch
U.S. Nuclear Regulatory Commission Region III
2443 Warren Road
Suite 210
Lisle, Illinois 60532-4352
Attached is a request to amend license 21-03039-01 to allow for the use or storage of licensee’s materials. This will increase the license conditions to use or store licensee’s materials from twenty seven (Amendment Number 47) to twenty eight.
If you have any questions, please contact Tom Killingsworth, Radiation Safety Officer, at 517-636-4961.
Sincerely,
Matthew Bellgowan, P.E.
Construction Operations Engineer
Construction Field Services Division
Attachment
cc: John Watson
Jim Petronski
Don Lonser
Tom Killingsworth
APPLICATION FOR MATERIALS LICENSE
APPLICATION FOR DISTRIBUTION OF EXEMPT PRODUCTS FILE APPLICATIONS WITH:
MATERIALS SAFETY LICENSING BRANCH
DIVISION OF MATERIAL SAFETY, STATE, TRIBAL, AND RULEMAKING PROGRAMS
OFFICE OF NUCLEAR MATERIAL SAFETY AND SAFEGUARDS
U.S. NUCLEAR REGULATORY COMMISSION
WASHINGTON, DC 20555-0001
ALL OTHER PERSONS FILE APPLICATIONS AS FOLLOWS:
IF YOU ARE LOCATED IN:
ALABAMA, CONNECTICUT, DELAWARE, DISTRICT OF COLUMBIA, FLORIDA,
GEORGIA, KENTUCKY, MAINE, MARYLAND, MASSACHUSETTS, NEW HAMPSHIRE,
NEW JERSEY, NEW YORK, NORTH CAROLINA, PENNSYLVANIA, PUERTO RICO,
RHODE ISLAND, SOUTH CAROLINA, TENNESSEE, VERMONT, VIRGINIA, VIRGIN
ISLANDS, OR WEST VIRGINIA,
SEND APPLICATIONS TO:
LICENSING ASSISTANCE TEAM
DIVISION OF NUCLEAR MATERIALS SAFETY
U.S. NUCLEAR REGULATORY COMMISSION, REGION I
2100 RENAISSANCE BOULEVARD, SUITE 100
KING OF PRUSSIA, PA 19406-2713
IF YOU ARE LOCATED IN:
ILLINOIS, INDIANA, IOWA, MICHIGAN, MINNESOTA, MISSOURI, OHIO, OR WISCONSIN, SEND
APPLICATIONS TO:
MATERIALS LICENSING BRANCH
U.S. NUCLEAR REGULATORY COMMISSION, REGION III
2443 WARRENVILLE ROAD, SUITE 210
Lisle, IL 60532-4352
IF YOU ARE LOCATED IN:
ALASKA, ARIZONA, ARKANSAS, CALIFORNIA, COLORADO, HAWAII, IDAHO, KANSAS,
LOUISIANA, MISSISSIPPI, MONTANA, NEBRASKA, NEVADA, NEW MEXICO, NORTH
DAKOTA, OKLAHOMA, OREGON, PACIFIC TRUST TERRITORIES, SOUTH DAKOTA, TEXAS,
UTAH, WASHINGTON, OR WYOMING,
SEND APPLICATIONS TO:
NUCLEAR MATERIALS LICENSING BRANCH
U.S. NUCLEAR REGULATORY COMMISSION, REGION IV
1600 E. LAMAR BOULEVARD
ARLINGTON, TX 76011-4511
PERSONS LOCATED IN AGREEMENT STATES SEND APPLICATIONS TO THE U.S. NUCLEAR REGULATORY COMMISSION ONLY IF THEY WISH TO POSSESS AND USE LICENSED MATERIAL
IN STATES SUBJECT TO U.S. NUCLEAR REGULATORY COMMISSION JURISDICTIONS.
1. THIS IS AN APPLICATION FOR (Check appropriate item)
□ A. NEW LICENSE
✔ B. AMENDMENT TO LICENSE NUMBER 21-03039-01
□ C. RENEWAL OF LICENSE NUMBER
2. NAME AND MAILING ADDRESS OF APPLICANT (Include zip code)
Michigan Department of Transportation
Construction Field Services Division
State Secondary Complex P.O. Box 30049
8885 Ricks Road Lansing, Michigan 48909
3. ADDRESS WHERE LICENSED MATERIALS WILL BE USED OR POSSESSED
Michigan Department of Transportation
Construction and Technology Laboratory
35414 Mound Road
Sterling Heights, Michigan 48310
4. NAME OF PERSON TO BE CONTACTED ABOUT THIS APPLICATION
Tom Killingsworth
5. RADIOACTIVE MATERIAL
a. Element and mass number; b. chemical and/or physical form; and c. maximum amount
which will be possessed at any one time.
6. PURPOSE(S) FOR WHICH LICENSED MATERIAL WILL BE USED.
7. INDIVIDUAL(S) RESPONSIBLE FOR RADIATION SAFETY PROGRAM AND THEIR TRAINING AND
EXPERIENCE.
8. TRAINING FOR INDIVIDUALS WORKING IN OR FREQUENTING RESTRICTED AREAS.
9. FACILITIES AND EQUIPMENT.
10. RADIATION SAFETY PROGRAM.
11. WASTE MANAGEMENT.
SUBMIT ITEMS 5 THROUGH 11 ON 8-1/2 X 11" PAPER. THE TYPE AND SCOPE OF INFORMATION TO BE PROVIDED IS DESCRIBED IN THE LICENSE APPLICATION GUIDE.
12. LICENSE FEES (Fees required only for new applications, with few exceptions*)
(See 10 CFR 170 and Section 170.31)
*Amendments/Renewals that increase the scope of the existing license to a new or higher fee category will require a fee.
PER THE DEBT COLLECTION IMPROVEMENT ACT OF 1996 (PUBLIC LAW 104-134), YOU ARE REQUIRED TO PROVIDE YOUR TAXPAYER IDENTIFICATION NUMBER. PROVIDE THIS
INFORMATION BY COMPLETING NRC FORM 531: https://www.nrc.gov/reading-rm/doc-collections/forms/nrc531info.html
13. CERTIFICATION. (Must be completed by applicant) THE APPLICANT UNDERSTANDS THAT ALL STATEMENTS AND REPRESENTATIONS MADE IN THIS APPLICATION ARE BINDING UPON
THE APPLICANT.
THE APPLICANT AND ANY OFFICIAL EXECUTING THIS CERTIFICATION ON BEHALF OF THE APPLICANT, NAMED IN ITEM 2, CERTIFY THAT THIS APPLICATION IS PREPARED IN
CONFORMITY WITH TITLE 10, CODE OF FEDERAL REGULATIONS, PARTS 30, 32, 33, 34, 35, 36, 37, 39, AND 40, AND THAT ALL INFORMATION CONTAINED HEREIN IS TRUE AND CORRECT
TO THE BEST OF THEIR KNOWLEDGE AND BELIEF.
WARNING: 18 U.S.C. SECTION 1001 ACT OF JUNE 25, 1948 62 STAT. 749 MAKES IT A CRIMINAL OFFENSE TO MAKE A WILLFULLY FALSE STATEMENT OR REPRESENTATION TO
ANY DEPARTMENT OR AGENCY OF THE UNITED STATES AS TO ANY MATTER WITHIN ITS JURISDICTION.
CERTIFYING OFFICER – TYPED/PRINTED NAME AND TITLE
Matthew Bellgowan, Construction Operations Engineer
SIGNATURE
DATE 4/15/19
FOR NRC USE ONLY
| TYPE OF FEE | FEE LOG | FEE CATEGORY | AMOUNT RECEIVED $ | CHECK NUMBER | DATE |
|-------------|---------|---------------|--------------------|--------------|------|
| APPROVED BY | | | | | |
NRC FORM 313 (10-2017)
Extremely Urgent
Visit ups.com® or call 1-800-PICK-UPS® (1-800-742-5877) to schedule a pickup or find a drop off location near you.
Domestic Shipments:
- To qualify for the Letter rate, UPS Express Envelopes may only contain correspondence, urgent documents, and/or electronic media, and must weigh 8 oz. or less. All those listed or weight
International Shipment:
- The UPS Express Envelope value. Certain countries ups.com/importexport
- To qualify for the Letter UPS Express Envelopes
Note: Express Envelopes containing sensitive personal information or cash equivalent.
This envelope is for use with the following services:
- UPS Next Day Air®
- UPS Worldwide Express™
- UPS 2nd Day Air®
Apply shipping documents on this side.
Do not use this envelope for:
- UPS Ground
- Select®
- Same Day Expedited®
Shipping Document
RECEIVED APR 16 2019
SHIPMENT FROM
5185 E 6
REFERENCE NUMBER
TELEPHONE
517-322-1087
MI DEPT OF TRANSPORTATION
8885 RICKS RD
LANSING
MI 48917-9570
DELIVERY TO
Telephone
IL 603 9 - 03
(420) 60532 - 0000
UPS NEXT DAY AIR/UPS EXP
TRACKING #: 1Z 518 5E6 22 1001 0428
DATE OF SHIPMENT
5185 E679 YVP
WIGHT
DIMENSIONAL WEIGHT
LARGE AIR PACKAGE
SHIPPER RELEASE
EXPRESS (NFS)
DOCUMENTS ONLY
SATURDAY DELIVERY
17 518 5E6 22 1001 0428
UPC
3731408
ADC PRINTED US 4890 APR 16 18:19:18 2019 HIP 17-03-23 224805
|
<urn:uuid:b94b7caa-5b73-4c4f-986a-e030ce3f75b8>
|
CC-MAIN-2024-22
|
https://www.nrc.gov/docs/ML1910/ML19106A231.pdf
|
2024-05-30T22:27:42+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2024-22/subset=warc/part-00293-4dd72944-e9c0-41a1-9026-dfd2d0615bf2.c000.gz.parquet
| 779,929,161
| 2,009
|
eng_Latn
|
eng_Latn
| 0.581417
|
eng_Latn
| 0.400454
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | false
|
docling
|
[
683,
5451,
6788
] |
During servicing, the floor mat protects the customer's car from water, grease and dirt.
Seaside produces these mats from a heavy recyclable paper with an added embossed texture to help keep them in place and enhance absorbency.
Toll Free:1-877-946 -1886 www.seasidepaper.com
|
<urn:uuid:b115566a-4466-4384-884b-e6edf5ef0ff1>
|
CC-MAIN-2019-09
|
http://seasidepaper.com/wp-content/uploads/2016/02/EMBOSSED-FLOOR-MATS.pdf
|
2019-02-22T02:25:30Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247512461.73/warc/CC-MAIN-20190222013546-20190222035546-00622.warc.gz
| 228,371,525
| 65
|
eng_Latn
|
eng_Latn
| 0.995894
|
eng_Latn
| 0.995894
|
[
"eng_Latn"
] | false
|
rolmOCR
|
[
279
] |
Hunslet Carr Primary School
Guidance on Medication within School
High expectations Caring Positive attitude Successful
Policy reviewed: March 2017 Next review: March 2019
STRENGTHS OF OUR SCHOOL
The Children
Are well behaved, calm and polite Are engaged, positive and resilient Are supportive and helpful towards others Have an input on important decisions Have a sense of belonging
The Community
School supports the whole family not just the child Recognises the importance of attendance Spreads our growing reputation as a good school Helps celebrate the children's achievements Supports the school on improving behaviour
The Curriculum
Is a fun curriculum that is engaging Maintains a strong focus on the basic skills Is enriched through extra-curricular activities Supports our most vulnerable children Provides a rich variety of experiences & opportunities
The Staff
Develop nurturing relationships with children Provide good quality teaching and learning Support one another to help the children Are consistent in how they treat children Identify children's SEN needs early
THE CURRICULUM WE HOPE TO PROVIDE
Skills
Fluent and confident in Reading, Writing and Maths Communicate with confidence
ICT skills fit for the future Life skills – social, money, time, cooking Safety skills – Swimming, healthy choices Problem solving skills – Patience & Resilience
Attitudes
Confident, proud and independent The believe that 'Impossible is Nothing' Understand and celebrate a range of cultures Take responsibility for themselves & others Be honest and learn from their mistakes Respectful, caring and helpful
Experiences
To have 1 st hand experiences of… Going away on a residential trip Visiting a range of places of worship A chance to look after an animal Relevant trips to theatres/farms/beaches Taking part in public performances Work experiences & further education
Knowledge
High school ready English & maths To know about local places of interest To know where we are in the world Life skills – money, time, cooking Information about possible careers To know major historical facts To know their own strengths
Contents
1.0 The Law
1.1 Under the Health & Safety at Work etc. Act 1974 the employer is responsible for making sure that a school has a health and safety policy. This should include procedures for supporting children with medical needs including managing prescribed medication.
1.2 The Children's Act 1989 authorises people who have care of a child (other than parental responsibility), subject to the provisions of the Act, to do what is reasonable in all the circumstances of the case for the purpose of safeguarding or promoting the child's welfare.
1.3 The Education (School Premises) Regulations 1999 require every school to have a room appropriate and readily available for use for medical or dental examination and treatment and for the caring of sick or injured pupils. It must contain a washbasin and be reasonably near a water closet. It must not be teaching accommodation.
1.4 The Disability Discrimination Act (DDA) requires that the body responsible for a school must not discriminate against a disabled person. Any children with medical needs who are also disabled will be protected under this act.
1.5 Under the DDA a person is defined as having a disability "if they have a physical or mental impairment which has a substantial and long-term adverse effect on their ability to carry out normal day-to-day activities". The Act includes a list of conditions which automatically mean a person with the condition is disabled under the DDA. Only a court of law can decide whether or not somebody has a condition causing them to be disabled under the DDA (a medical practitioner can not decide whether or not a person is disabled).
1.6 Under the DDA, a responsible body discriminates against a disabled person if for a reason which relates to the person's disability, it treats him less favourably than it treats or would treat others to whom that reason does not or would not apply; and it cannot show that the treatment in question is justified.
1.7 A teacher or other member of staff in a school or college who looks after pupils and students in place of the parent (in loco parentis), must treat and take care of the pupil as a "careful parent" would. If a request is made in relation to a pupil's medical needs then consideration should be given to whether or not the request is what would be expected of a reasonable parent in the same circumstances.
2.0 Introduction
Most pupils may need to take medication at some time whilst they are at school. All schools should have a clear, written policy on managing medication in school and have effective management systems to support individual pupils with medical needs.
The school must ensure there it has a school policy and procedures so that no person is placed at risk from the storage, administration and disposal of medication.
The governing body of a school has a legal duty to make arrangements to ensure that pupils with medical needs are able to attend school with as little disruption as possible. This might be through staff members who volunteer to administer medication or training support staff so that they are able to manage medication. This will involve the governing body possibly employing someone whose specific role is to administer medication. This applies to mainstream and special schools.
A school that has appropriate procedures will be better placed to enable pupils attending school who require medication to continue their education with as little disruption as possible.
Unless so directed by the terms of their employment contract, no member of staff should feel compelled to be responsible for the administration of medication to pupils. For most teachers the priority of safeguarding the welfare of children in their care will mean they will be happy to administer medicine as set out in the school's policy, however support staff might have contracts or job descriptions that make the administration of medication part of their role.
3.0 School policy and procedures
Under health and safety legislation, schools are required to implement systems of work that will ensure the safety, not only of staff, but also of any other person affected by the school's activities. This includes the administering and storage of medication .
3.1 A school's policy should include the following;
- A statement that the School accepts responsibility for members of staff who volunteer to give, or supervise children (including sixth formers) taking, prescribed medicine during the school day;
- the circumstances – if any – in which pupils may take non-prescription medicine such as painkillers (analgesics)
- the school's policy on assisting pupils with long-term or complex medical needs;
- the need for prior written agreement from a parent or guardian for any medication, prescription or non-prescription, to be given to a pupil;
- the requirement for any member of staff giving medicine to check: the pupil's name; that there are written instructions provided by the parent or doctor; the prescribed dose and the expiry date of the medicine. If staff are in doubt they should not give the medication until these things have been checked and the full details known.
- when and where pupils can carry and take their own medication;
- staff training for dealing with medical needs;
- record keeping;
- storage and access to medication;
- emergency procedures.
3.2 It should clearly state that parents should provide the school with full information regarding their child's medical needs. It should encourage staff to report any deterioration in a child's health to the Headteacher who can then inform the parent.
3.3 Schools should always establish a written record of the details of any pupil with special medical requirements at the earliest opportunity; if possible this should be done before the pupil starts or returns to school. This should be in the form of a health care plan (see Appendix 1). In cases where pupils have short term and relatively straight forward medical needs it might be sufficient to record the information in an abbreviated form of the health care plan.
3.4 Any instructions to the school should be in writing and should be clear, specific and include as much detail as necessary.
3.5 The parent or guardian's agreement to the health care plan should be signed and they should be provided with a copy of the plan if requested.
3.6 Any changes to a health care plan must be agreed with the parent or guardian and should be recorded in writing.
3.7 All school employees who look after pupils should be aware of the school's policy and should be informed what the school's general procedures are in relation to any pupil with medical requirements.
4.0 Responsibilities
4.1 Leeds City Council
Leeds City Council has a responsibility to ensure that each school has a health and safety policy. The school should also have a medication policy which should include procedures for assisting and supporting pupils with medical needs, including managing medication.
4.2 Governing body
The school governing body should ensure that their school has developed its policy to assist pupils with medical needs and that staff involved with administration of medication have had the appropriate training. They must also arrange for staff to have epi-pen training where this is required.
4.3 Headteacher
The Headteacher is responsible for implementing the school's policy and procedures and should ensure that all parents are aware of these. Where staff volunteer to assist, the Headteacher must ensure that they receive suitable and sufficient information, instruction and training to be able to undertake this function in a safe and effective manner. This also applies to staff who volunteer to be reserves to cover for absence.
The Headteacher should ensure that a written health care plan for each child with medical needs is drawn up in conjunction with the parent and School Medical Officer or GP. Where there is concern that a child's needs may not be able to be met by a school, or the parent's expectations appear unreasonable, the Headteacher should seek further advice from the school nurse, child's GP, Education Leeds and other medical advisers.
Where a Headteacher wishes to share information with other staff within a school they should first seek permission from the child's parent or guardian or the child, if the child is mature enough. Parents' culture and religious views should be respected at all times.
The Headteacher is responsible for making sure that medicines are stored safely.
4.4 Parents
The prime responsibility for a child's health rests with the parent or guardian; they are responsible for making sure their child is well enough to attend school.
The parent/guardian, or pupil if they are mature enough, should provide the school with sufficient information about the pupil's medical condition. This should be undertaken in conjunction with the child's GP or paediatrician, as appropriate. Where a child is acutely unwell it is advised that the parent keep him/her at home, and parents should be advised about this on a regular basis by newsletters.
If pupils become unwell at school they should be collected as soon as possible. It is vital to have relevant home and emergency contact telephone numbers. These details must be regularly updated.
4.5 Staff administering medication
The administering of medicine in school is a voluntary role for individual members of staff except where this is stated in the job description. Those who undertake this role and/or provide support to pupils with medical needs require sufficient training, information and instruction from their Headteacher and the child's parent/guardian. Training and advice can be obtained from the local NHS Trust.
Where an alternative or ancillary member of staff is with a pupil with medical needs the Headteacher must ensure that they have received the requisite level of training, information and instruction.
Staff who volunteer to assist with the administering of medication and have been authorised by the Headteacher to undertake this task will be covered under the school's employer's liability insurance.
Further information on administering medication is provided in Section 5.5
4.6 Teachers and other school staff
A teacher who has a pupil with medical needs in his/her class should understand the nature of the child's condition and when and where that pupil requires additional attention.
In particular, staff should be aware if any emergency is likely to occur and what measures they should take if one does. These measures should be in writing and be readily accessible.
Other school staff such as lunchtime assistants or support staff who may, at certain times, be responsible for children with medical conditions should be provided with sufficient support and advice.
Information and advice should also be provided to the school's first aiders if the pupil's medical condition has implications for any first aid treatment which may be given.
4.7 School transport escorts
It should not be necessary, in normal circumstances, for escorts to be trained to administer any form of medication.
Where the school transport service transports children with medical needs to and from school and escorts supervise them, the escorts should be provided with suitable and sufficient information in respect of the medical conditions and medications of the children in their care.
This information should be provided via the school transport office in consultation with the school Headteacher and the pupil's parent.
4.8 The Health Service
The local health authority has a statutory duty to purchase services to meet local needs. These services are provided by the local National Health Service (NHS) Trust.
The main contact with schools is likely to be via the School Health Service, school nurse or doctor, who may be able to help a school draw up individual health care plans for pupils with medical needs or may be able to supplement information provided by the child's parent or GP. The school nurse or doctor will be able to advise on training for staff willing to administer medication or take responsibility for other aspects of support.
4.9 The General Practitioner (GP)
Most parents will register their child with a GP. The GP has a duty of confidentiality to their patients and should only exchange information with the school with the consent of the child's parent or guardian or the child, if the child is mature enough. In some cases parents may agree for a GP to liaise directly with a school, in others it will be via the School Health Service (schools should seek advice from the School Medical Officer).
In some instances a parent or child may not wish the GP to provide a school with any information in respect of their child's condition. In these cases the GP will observe such confidentiality and must comply with the parent's or child's wishes.
5.0 Provision of medication
5.1 Short term needs:- prescribed medicines
Medicines should only be taken to school when essential; where it would be detrimental to a pupil's health if the medicine was not administered during the 'school day'. At some time during a pupil's school life they may need to take medication – e.g. to finish a course of antibiotics or apply a lotion and to minimise the amount of time a pupil is away from school, it may be necessary to continue the treatment of antibiotics or lotion after the pupil returns to school to finish the course of medication. Where this happens it is advised that the parent requests that the prescription is such that the pupil does not need to take any medication whilst at school e.g. a dose-frequency of 3 times per day rather than 4 times per day dose. The school policy should encourage parents to request such a prescription.
Medicines must be provided in an original container (as dispensed by the pharmacist) and include the prescriber's instructions for administration. Prescribers should be encouraged to provide two prescriptions for a child's medication, where appropriate and practicable: one for home and one for use in the school, avoiding the need for the repacking or re labelling of medicines by parents. Any medication brought into school must be clearly marked with the name of the pupil and the recommended dosage. It must be kept secure, unless there are valid reasons for the pupil to keep that medication with them (e.g. asthma inhaler). There may be occasions when a bottle of medicine has to be taken to school. The school policy should encourage the parents and Headteacher to discuss such requirements.
SCHOOLS SHOULD NEVER ACCEPT MEDICINES THAT HAVE BEEN REMOVED FROM THEIR ORIGINAL CONTAINER NOR MAKE CHANGES TO DOSAGE ON PARENTAL INSTRUCTION.
5.2 Long-term medical needs
Schools must have sufficient information about the medical condition of any pupil with long-term medical needs.
The parent or guardian should supply such information either prior to a pupil attending school or as soon as the condition becomes known.
Schools should allow pupils who can be trusted to manage their own medication from an early age, although parents must give their consent and the pupil should be supervised when taking it.
The school policy should identify in what circumstances pupils can carry their own medicine. Any teacher who may come into contact with such a pupil should be provided with suitable and sufficient information regarding the pupil's condition and the medicine they are taking.
5.3 Non-prescription medicines
Schools should only allow medications onto the premises that have been prescribed by a doctor, dentist, nurse prescriber or pharmacist prescriber. Schools should not enter into an agreement to administer non-prescribed medicines on a regular basis.
Staff should never give a non-prescribed medicine to a pupil unless there is a specific prior written permission from the parents. Such written consent will need to state the medicine and the dose to be taken. The parent should supply the medicine in the original packaging. Where the head agrees for staff to administer a non-prescribed medicine it must be in accordance with the policy. The policy must set out the circumstances under which staff may administer non-prescribed medicines.
Where non-prescription medicine has been given, a strict system must be in place to ensure that a record is made of who received the medicine, what dose was given, who gave the medicine and when. A written note should also be sent to the child's parent on the same day the medicine is given.
It should inform them that a specified non-prescription medicine has been given, at what time and at what dose. The pupil must be supervised whilst s/he takes any nonprescription medicine.
If a pupil suffers regularly from frequent or acute pain the parents should be encouraged to refer the matter to the pupil's GP.
NO pupil under the age of 16 should be given aspirin or medicines containing ibuprofen unless prescribed by a doctor.
The UK Medicines Control Agency has recommended that children under 16 should not be given aspirin, because of its links with Reye's syndrome, the rare but potentially fatal disorder found almost exclusively in children and adolescents.
The use of aspirin by children under 12 has been banned in the United Kingdom since 1986, and the Committee on Safety of Medicines warned that it should also be avoided in children up to 15 if they were feverish.
5.4 Clinical Decisions
In the absence of clear guidance from a medical professional, it is not advised that any member of school staff makes a clinical decision with regard to the needs of a pupil unless in extreme circumstances.
Any instructions given to schools in relation to a pupil's medical requirements should be specific and clear enough to avoid the need of requiring school staff to make any judgements about what medication to administer. If necessary the school should arrange a multi-agency meeting with appropriate health care professionals where clear instructions can be obtained and a pupil risk assessment can be determined.
If a child's medical needs are such that the dosage, or method of administration of any medication might vary depending on other factors, schools should be provided with explanative charts, diagrams or other printed guidance wherever possible.
If any medical problems arise which are not covered by a pupil's Health Care Plan, or any instances where the details on the Health Care Plan are found to be unclear, the school should contact the pupil's parent or guardian, or seek medical advise before taking any further action unless doing so would put the child at risk.
5.5 Administering medicine
Member of staff have no contractual obligation to give medicine, supervise a pupil taking medicine or assist in any treatment of a pupil requiring medicine unless specifically set out in their contract of employment under their job description. Teachers job descriptions state they must safeguard the children in their care and administering medicine would come under this remit.
Staff may volunteer to give medicine and assist with treatment. In this case they should be provided with suitable and sufficient training to enable them to carry out their voluntary duties safely and responsibly and should include training on the administering of i.e. eye and nose drops. Such training can be arranged in conjunction with the local Health Trust. The school should maintain a written record of which member of staff has volunteered to administer which medication and what training each member of staff has received.
Any member of staff giving medicine should check
- the pupil's name;
- that there are written instructions provided by the parent or doctor;
- the prescribed dose and the expiry date of the medicine.
If there is any doubt about these details, or they are not provided, then medication should not be given until the full details are known. Medication should not be administered until full information is provided.
Each time a pupil is given medication a record should be made, including the date, time, what was administered and, if necessary, details of any problems, which the person administering the medication should sign.
Where invasive or intimate treatments are required then the person carrying out such a treatment should be of the same gender as the pupil receiving the treatment. One additional adult should be present whilst the treatment is carried out unless intimate care procedures indicate otherwise. Those persons who volunteer to provide intimate or invasive treatments must be suitably trained. Please refer to the intimate care guidance available on Leeds City Council "Infobase" (Quicklink D199).
Training and advice can be obtained from the local NHS Trust
Where invasive or intimate treatments are required but no member of staff volunteers to provide it, the Headteacher and parents must respect the staff's wishes not to do so and not put any pressure on them to assist in such treatment.
It will then be necessary to refer to the local Health Trust for advice on how to continue providing treatment.
Under no circumstances should any person employed by the school administer medication if they have not received requisite training or authorisation from their Headteacher. If a pupil is at severe risk because their medication cannot be given, the Headteacher must ensure that there are suitable emergency arrangements in place.
Do not give medicine to any pupil under the age of 16 without their parent's written consent.
6.0 Self Management
Schools should encourage young people to take control of their medication and illness from a young age. The ages that children are able to take control of their medicines varies enormously. It should however be considered that in some circumstances a young person might not ever mature enough to take medical responsibility for themselves at school. As young people grow, develop and mature they should be encouraged to participate in decisions about their medications and to take responsibility.
If pupils are able to take medication themselves, then staff may only need to supervise. The school policy should include whether pupils may carry and administer (where appropriate) their own medication, and the safety of other pupils.
Where pupils are prescribed controlled drugs staff need to be aware that these need to be kept in safe custody. Pupils should be able to access these for selfmedication if it is agreed that it is appropriate.
7.0 Refusal to take medicine
No person can be forced to take medicine should they refuse.
If a pupil refuses to take medicine and the information provided by the pupil's parent and/or GP suggests that the pupil is at great risk if they do not take their medication, the parents should be contacted immediately. If a parent cannot be contacted medical advice and/or call the emergency services should be called.
Where the information provided indicates that the pupil will not be at great risk if they do not take their medication, but the parent has informed the school that their child should receive their medication, the parent should be contacted as soon as possible.
Parents/ primary carer/ guardian should be communicated with directly and not via a note sent home with the pupil. Records of the conversations should be kept and the school may wish to follow this up with a letter.
8.0 Epi Pens and asthma inhalers
There are two aspects of medical care that some school staff have been able to manage without undue concern about imposition or impracticality.
Children and adults who have a sudden and severe allergic reaction to a foodstuff; insect bite or other external irritant may become ill quite quickly. Epi pens are considered to be a risk free treatment. If staff are correctly trained to administer the Epi pen they are a one shot injection that cannot do any harm and at the worst they have no effect.
Schools are expected to have some provision for the emergency treatment of anaphylaxis. First aid treatment can include the appropriate use of epi pens. Staff might be happy to volunteer to specifically administer epi pens.
If staff are not prepared to administer epi pens this needs to be made clear to parents of individuals involved. These issues need to be covered within the medication policy. Epi pens need to be covered within the medication policy.
Epi pens need to be stored in a dry area with a constant temperatures they are fragile and can become ineffective if they are knocked or become too cold. Where possible a minimum of two epi pens should be kept on site in the event that one fails. The use by date of each pen should also be monitored to ensure they are within the effective date for use.
As asthma affects between 10% and 17% of the general school population and has a variety of degrees of severity. It is important that the parent / guardian informs the school if their child requires and inhaler. Older pupils are able to self administer their own medication and parents / guardians should be part of this process.
Inhalers for younger pupils who are unable to administer their own medication should be kept in a safe place and labelled in the same manner as any other medication. In the case of an asthma attack the inhaler would need to be administered urgently so the school must have an emergency procedure so that all staff are aware of the location of all inhalers.
The storage of inhalers need to be well managed and the distance between where the pupil is situated and where the inhalers are stored must also be considered. Parents / guardians should request an extra inhaler from their family doctor so that this can be left at the school premises. Schools must not allow inhalers for one pupil to be used by another and must only allow each inhaler to be used by the pupil it is prescribed for except in extreme emergencies.
9.0 Health care plan
To ensure that each child with medical needs receives the appropriate support in school, and that all persons who may come into contact with the pupil have access to sufficient information, the Headteacher should ensure that a written health care plan is drawn up. This should be done in conjunction with the parent and School Medical Officer or GP etc.
It should give details of the pupil's condition, daily care requirements, emergency action to take and when to take it, who is responsible in an emergency (including reserve(s)) and any follow up care that may be needed.
Input into the health care plan should be sought from everyone with whom the pupil is likely to have contact – e.g. class teacher, form tutor, year head, care assistant, school staff who have agreed to administer medication, school health service, escorts/schools transport service.
The plan should be provided to all staff that will have contact with the pupil including, for example, lunchtime supervisory assistants. As the medical information contained within the plan is confidential, the level of information provided to various staff should be carefully planned so that, for example, a Lunchtime Assistant knows what to do in an emergency but is not party to the specific reason for doing it if the parent, guardian, or pupil does not want their medical condition to be generally known.
The plan should also identify what particular training needs will be required for anyone volunteering to administer medicine.
The plan should reflect not only the physical needs of the pupil but the emotional needs as well. However, the Headteacher must not make value judgements about any medication prescribed, even though the child may appear to be unable to cope with taking his/her medicine. In those instances the Headteacher will need to discuss his/her concerns with the pupil's parent and/or health care professionals.
The plan should always identify what action should be taken in the event of the unexpected, e.g. an injury. If a pupil who accesses medication in school requires hospital or clinical treatment as a result of some incident always take the care plan, and the medication with them to hospital, or ensure that the parent takes them.
Note this in the records.
10 School trips and sporting activities
10.1 School trips
Pupils with medical needs should be encouraged to participate in school trips as long as the safety of the pupil, other pupils and/or staff is not placed at significant risk.
It may be necessary for a school to take additional measures for outside visits. This may include:
- additional staff supervision;
- adaptations for bus or coach seats and entrances;
- provision of secure cool-bags to store medicine;
- provision of properly labelled single dose sets.
When planning trips and visits which will include a pupil or pupils with medical needs, all persons supervising the trip should be made aware of the pupils' medical needs and any emergency procedures that may be needed (unless the parent/guardian does not give their prior consent to do this).
The location to be visited should be made aware that persons with medical needs are included in the party, if this is practicable and if the parents have consented (e.g. on a visit to a museum an appropriate member of the museum staff be made aware of any potential difficulties that may arise – such as a member of the party being epileptic). Where it is unlikely that any difficulties will occur there is no need to inform the place to be visited.
If a pupil's medical condition will be aggravated by the place being visited they should not be permitted to go – or take them to an alternative place.
If there is any doubt regarding a school trip the school should discuss the trip with the parent and also, if necessary, seek medical advice.
10.2 Sporting activities
Most pupils with medical needs should be able to participate in sporting activities either as part of the curriculum or as an extra-curriculum activity.
However, some children will need to take precautionary measures prior to and/or during exercise and may need immediate access to medication afterwards.
Any members of staff supervising pupils involved in P.E. and sporting activities must be aware of the relevant medical conditions and emergency procedures for any pupil with a medical condition who is participating in the lesson or activity either actively or as an observer. For extra-curriculum activity or after hour P.E. lessons, where a pupil with a medical need is participating, the level of supervision should be assessed, and it may need to be increased.
11.0 Storage & disposal of medicines
11.1 Storage of medicines
Medicines may cause harm to anyone for whom they were not prescribed. They may also be harmful for the person for whom they were prescribed if that person takes an incorrect dose. Some medicines are poisons, others can become poisons when they react with other substances.
The Control of Substances Hazardous to Health (COSHH) Regulations require that no person is placed at risk from the use of any hazardous substances. A medicine is a hazardous substance, to those administering the medication and those who may inadvertently be exposed to it.
Where a medicine may be thought to be non toxic or non poisonous, it should still be classed as being toxic to avoid any confusion.
Managers are required to assess the risks presented by a hazardous substance to any person who may come into contact with it. Then, having assessed the risk, they should determine the method or methods by which that risk may be removed, reduced or controlled.
The primary consideration is to eliminate the risk completely. This may be done by not allowing medicines into the school and, for example, requiring pupil to be placed on 3 x daily doses rather than 4 x daily doses if appropriate.
If the hazardous substance cannot be eliminated from the school the next requirement is to substitute it for a less hazardous substance if one exists. Schools should encourage GP's, via the School Health Service, to prescribe less toxic alternatives if the medicine has to be taken at school.
If there is no means of eliminating or substituting the hazardous substance controls to reduce any risk of harm to the lowest level that is possible should be implemented.
All controlled drugs must be kept in an approved (meet with the requirements of the misuse of drugs regulations) lockable receptacle . This must be locked at all times except when being accessed for the storage of medication or the administration to the named recipient.
Lockable receptacles must be:
- Of robust construction
- Securely bolted to the floor or wall
- Made of steel
- Kept in a room or building that is alarm protected.
Ideally it should be locked by a key and a combination lock together. This will allow a master key to be fastened to the inside of the receptacle and only the head teacher to have the combination code to unlock in an emergency. The integrity of using only a combination lock can not be guaranteed.
- Keys, should be kept to a minimum and only held by individuals who have legitimate authority to access the medicine cabinet. These should never be given to an unauthorised person, left on hooks, in desks or out on display.
- Large volumes of medicines should not be stored. Staff should only store, supervise and administer medicine that has been prescribed for an individual pupil.
- Medicines should be stored strictly in accordance with product instructions.
- Pupils should know where their own medicines are stored and who holds the key.
- All emergency medicines, such as asthma inhalers and adrenaline pens, should be readily available to pupils and should not be locked away.
- Few medicines need to be refrigerated. These can be kept in a refrigerator with food but they must be in an air tight container and clearly labelled.
- There should be restricted access to a refrigerator holding medication. When the staff room is not occupied – depending on the risk assessment undertaken by the Headteacher – the room or the fridge should be locked so that access is denied to everyone except those authorised by the Headteacher.
Medicine should be stored in original containers which are labelled with:
- the name of the person for whom the medicine is prescribed;
- the prescribed dose;
- the name and constituents (if known) of the medicine;
- the time the prescribed dose is to be taken;
- the expiry date of the medicine;
- who to contact in an emergency;
- the name of the person or organisation responsible for prescribing the medicine;
- any likely side effects for the person taking the medicine (e.g. harmful or toxic if swallowed, harmful by inhalation, harmful if in contact with the skin or eyes).
It may not always be possible to get all the above information from the original container. If this is so, the pharmacy supplying the medicine or the pharmacy department of the local NHS Trust may be of assistance.
Some medicines can have serious ill health effects on those giving the medicine, produce harmful vapours, some can be corrosive or produce dermatitis; some can sensitise those giving the medicine, some people may already be sensitive to the medication – particularly those who suffer from eczema or asthma.
Staff who volunteer to administer medicine which has been assessed as being a sensitiser should be asked if they have respiratory or skin problems. If they have, the Headteacher should seek an alternative volunteer. Volunteers should be provided with suitable personal protection such as disposable gloves, face mask, etc. Should a volunteer become sensitised to a particular medication they should cease to administer it and again the Headteacher should seek an alternative volunteer. Such reactions, however, are rare.
11.2 Disposal of medicines
Under no circumstances should a school dispose of any prescribed medicine or the container from which it came. The parent of the pupil for whom the medicine was provided should collect all empty containers, surplus medicines and out-of-date medicines. They should also collect medicines held at the end of each term. If parents do not collect all medicines, they should be taken to a local pharmacy for safe disposal. If parents do not collect all medicines they should be taken to a local pharmacy for safe disposal.
On the very rare occasion that the school has to dispose of any of the above, advice should be sought from the Leeds City Council's Environmental Health Waste Disposal Service before disposal of any items. Pharmaceuticals that are cytostatic or cytotoxic (are defined as any medicinal product that has one or more of the following hazardous properties: Toxic (H6), Carcinogenic (H7), Mutagenic (H11) or Toxic for Reproduction (H10)) are classed as "hazardous Wastes" under Hazardous Waste Regulations 2005 as such disposal must be in accordance with the requisite Regulations.
11.3. Disposal of sharps
Sharps boxes should always be used for the disposal of needles. Sharps boxes can be obtained by parents on prescription from the pupil's GP or paediatrician. Collection and disposal of the boxes should be arranged with Leeds City Council's Environmental Waste Disposal Unit.
12.0 Further Information
More information regarding medication in schools – in particular basic information regarding common conditions such as asthma, epilepsy, diabetes and anaphylaxis – is available in the DfES and Department of Health publication " Managing medicines in schools and early year settings" Reference 1448-2005DCL-EN March 2005 –DfES.
The publication includes forms that can be used as part of the school's policy on administering medication. Copies of the forms are available from Children Leeds' Health Safety and Wellbeing team. The forms in the pack are as follows:
- Healthcare plan for a pupil with medical needs
- Confirmation of the Headteacher's agreement to administer medication
- Request for school to administer medication
- Record of medication administered in school
- Request for pupil to carry his/her own medication
- Staff training record – administration of medical treatment
- Guidelines for the administration of rectal diazepam in epilepsy and febrile convulsions for non-medical/ non-nursing staff
- Emergency planning – request for an ambulance
- Leeds City Council - Intimate care guidelines
- Leeds City Council - medical needs policy, 2008
- Drugs: Guidance for schools (DfES, 2004) Ref: DfES/0092/2004 http:// www.teachernet.gov.uk/drugs/
Code of Practice for Schools- Disability Discrimination Act 1995:Part 4 (Disability Rights Commission, 2002). Ref: COPSH. http://www.drc-b.org/thelaw/practice.asp Disability Rights commission Tel:08457 622 633
Special Educational Needs Code of Practice (DfES, 2001) Ref: DfES/0581/2001 www.teachernet.gov.uk/teachinginengland/detail.cfm?id=390
National Service Framework for Children and Young People and Maternity Services: Medicines and Children and Young People. Website: www.dh.gov.uk/healthtopics (click on Children's Services). Order:DH Publications Tel: 08701 555 45
Council for Disabled Children publication "The Dignity of Risk"
13.0 Useful Contacts
Allergy UK
Allergy Help Line: (01322) 619864
Website: www.allergyfoundation.com
Asthma UK(formerly the National Asthma Campaign)
Adviceline: 08457 01 02 03 (Mon-Fri 9am to 5pm)
Website: www.asthma.org.uk
Diabetes UK
Careline: 0845 1202960 (Weekdays 9am to 5pm)
Website: www.diabetes.org.uk
Department for Education and Skills
Tel: 0870 000 2288
Website:www.dfes.gov.uk
Department of Health
Tel: (020) 7210 4850
Website:www.dh.gov.uk
Epilepsy Action
Freephone Helpline: 0808 800 5050 (Monday – Thursday 9am to 4.30pm, Friday 9am to 4pm)
Website: www.epilepsy.org.uk
National Society for Epilepsy
Helpline: (01494) 601400 (Mon-Fri 10am to 4pm)
Website: www.epilepsynse.org.uk
APPENDIX I: FORMS
All forms set out below are examples that schools and settings may wish to use or adapt according to their particular policies on administering medicines.
FORM 1 – Individual Healthcare Plan
Hunslet Carr Primary School
Name of School/Setting Child’s name Class Name Year Group Date of Birth Child’s Address
Medical Diagnosis or Condition
Date
Review date
CONTACT INFORMATION
Family contact 1
Family contact 2
Name
Name
Phone No. (work)
Phone No. (work)
(home)
(home)
(mobile)
(mobile)
Clinic/Hospital contact
GP
Name
Name
Phone No.
Phone No.
Who is the named member of staff responsible for providing support in school?
Describe medical needs and give details of child’s symptoms, triggers, signs, treatment, facilities, equipment or devices etc
Name of medication, dose, method of administration, when to be taken, side effects. Administered by who (if self with/without supervision)
Daily care requirements: (e.g. before sport/at lunchtime)
Specific support for pupil's educational, social and emotional needs
Arrangements for school visits/trips etc
Other information
Describe what constitutes an emergency, and the action to take if this occurs
Who would be responsible in an emergency?
Who has this plan been developed with?
What are the staff training requirements – Who, What, When?
Form Copied and sent to:
FORM 2
Parental agreement for school/setting to administer medicine
The school/setting will not give your child's medicine unless you complete and sign this form, and the school or setting has a policy that staff can administer medicine
Name of School/Setting
Hunslet Carr Primary School
Name of Child:
Date of Birth:
Class Name
Year Group
Medical condition/illness:
Medicine
Name/Type of Medicine (as described on the container):
Date dispensed from the pharmacy: Expiry date on the medication packaging:
Dosage and method:
Timing:
Special Precautions/Other instructions:
Are there any side effects that the school/setting needs to know about? Self Administration: Yes/No (delete as appropriate)
Procedures to take in an Emergency:
Medicines must be in their original container as dispensed by the pharmacy.
Contact Details
Name:
Daytime Telephone No: Relationship to Pupil: Address:
I understand I must deliver the medicine personally to
The school office who will store it safely.
The above information is, to the best of my knowledge, accurate at the time of writing and I give consent to school staff administering medicine in accordance with the school policy. I will inform the school immediately, in writing, if there is any change in dosage or frequency of the medication or if the medicine is stopped.
Parent’s signature:
Print
Name:
If more than one medicine is to be given a separate form should be completed for each one.
Confirmation of the Head's agreement to administer medicine
It is agreed that:
[name of pupil]
Will receive:
[quantity and name of medicine]
Every day at:
[time medicine to be administered]
This will continue until:
[end date of course of medicine]
Date:
Signed:
[Headteacher or most senior SLT member]
Record of medicine administered to an individual pupil
STOP – Right Form? Right Child? Right Time? Right Medicine? Right Dose?
If you are unsure ask for support or guidance from a senior member of staff.
Date
Time Given
Dose Given
Name of member of
staff
Staff initials
Date
Time Given
Dose Given
Name of member of
staff
Staff initials
Date
Time Given
Dose Given
Name of member of
staff
Staff initials
Date
Time Given
Dose Given
Name of member of
staff
Staff initials
FORM 3
Date
Child’s
name
Time
Name of
Medicine
Dose given
Any
reactions
Signature of
Staff
Print name
| Child’s name |
|---|
| Time |
| Name of Medicine |
| Dose given |
| Any reactions |
| Signature of Staff |
| Print name |
FORM 4 Staff training record
Name of School/Setting:
Hunslet Carr Primary School
Name:
Type of training received:
Date of training completed:
Training provided by:
Profession and title:
I confirm that ___________________________ [name of member of staff] has received the training detailed above and is competent to carry out any necessary treatment. I recommend that the training is updated (please state how often)
Trainer's signature:
Date:
I confirm that I have received the training detailed above.
Staff signature:
Date:
Suggested Review Date:
FORM 5 - Contacting Emergency Services
Request for an Ambulance
Dial 999, ask for ambulance and be ready with the following information
1. Our Telephone Number - 0113 2713804
2. Give your location as follows - Woodhouse Hill Road, Leeds
3. State that the postcode is - LS10 2EF
4. Give exact location in the school/setting
5. Give your name
6. Give name of pupil and a brief description of pupil's symptoms
7. Inform Ambulance Control of the best entrance and state that the crew will be met and taken to the patient
Speak clearly and slowly and be ready to repeat information if asked
Put a completed copy of this form by the telephone
FORM 6 – Letter inviting parents to contribute to IHCP development
Dear Parent
DEVELOPING AN INDIVIDUAL HEALTHCARE PLAN FOR YOUR CHILD
Thank you for informing us of your child's medical condition. I enclose a copy of the school's policy for supporting pupils at school with medical conditions for your information.
A central requirement of the policy is for an individual healthcare plan to be prepared, setting out what support the each pupil needs and how this will be provided. Individual healthcare plans are developed in partnership between the school, parents, pupils, and the relevant healthcare professional who can advise on your child's case. The aim is to ensure that we know how to support your child effectively and to provide clarity about what needs to be done, when and by whom. Although individual healthcare plans are likely to be helpful in the majority of cases, it is possible that not all children will require one. We will need to make judgements about how your child's medical condition impacts on their ability to participate fully in school life, and the level of detail within plans will depend on the complexity of their condition and the degree of support needed.
A meeting to start the process of developing your child's individual health care plan has been scheduled for xx/xx/xx. I hope that this is convenient for you and would be grateful if you could confirm whether you are able to attend. The meeting will involve [the following people]. Please let us know if you would like us to invite another medical practitioner, healthcare professional or specialist and provide any other evidence you would like us to consider at the meeting as soon as possible.
If you are unable to attend, it would be helpful if you could complete the attached individual healthcare plan template and return it, together with any relevant evidence, for consideration at the meeting. I [or another member of staff involved in plan development or pupil support] would be happy for you contact me [them] by email or to speak by phone if this would be helpful.
Yours sincerely
FORM 7 – Asthma Plan
|
<urn:uuid:91a1cbae-7b94-4bfc-aab3-3172942de016>
|
CC-MAIN-2018-43
|
http://hunsletcarr.co.uk/images/2015schoolpolicies/April17/Guidance%20on%20Medication%20in%20School%20-%20updated%20March%2014th.pdf
|
2018-10-21T23:14:19Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514437.69/warc/CC-MAIN-20181021224001-20181022005501-00209.warc.gz
| 157,901,566
| 9,841
|
eng_Latn
|
eng_Latn
| 0.95098
|
eng_Latn
| 0.998456
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"unknown"
] | false
|
rolmOCR
|
[
194,
1112,
2157,
2167,
5637,
8838,
12113,
15089,
18744,
22002,
25143,
28517,
31851,
34950,
38019,
41386,
42105,
42280,
43166,
43476,
44484,
45750,
45979,
46544,
47187,
49287,
49309
] |
FaIR ADVANCES REPORT
FaIR
an Institut Louis Bachelier interdisciplinary program
PUBLISHED in 2021
FAIR IS AN ILB FLAGSHIP
The core of the Louis Bachelier Group (ILB, Fondation du Risque, Institut Europlace de Finance) and its surrounding network is research, that aims to promote sustainable development in Economics and Finance.
We currently host more than 60 sponsored research programs divided in four societal transitions: environmental, digital, demographic, and financial.
More than ever, there is a need for cooperation between academia, business, and the public authorities. The Louis Bachelier network exists to promote the public-private-academic collaborations, enhance exchange of knowledge, and develop scientific contributions to societal challenges. As of today, more than 25 academic institutions, 100 corporate as well as public authorities has joined the network. Together, we seek answers for a world in transition!
The interdisciplinary program FaIR is one of our fine examples of this and more than ever an absolute priority at ILB.
We take a transitional challenge, combine it with our strengths and mix French and foreign experts. The result of that recipe can be found in this report on FaIR Advances. In it you will find contributions from ILB chair researchers as well as from the International Scientific Council and external partners such as the Turing Institute in London, with whom FaIR has had its ties since its creation in 2019.
With the emergence of new technologies in the banking and insurance sectors in particular, finance is undergoing a major change – hence the name of this interdisciplinary program. We need investments in interdisciplinary programs that focus on machine learning and artificial intelligence (AI) to learn, understand and advance in a sustainable way and at ILB we are more than happy to make our contribution.
The ILB Finance and Insurance Reloaded (FaIR) program supports and encourages innovations resulting from new technologies (ranging from Artificial Intelligence to blockchain) in the finance and insurance sectors. FaIR also functions as meeting place for all ILB initiatives that unite industrial as well as research partners around the impact of these new technologies. The FaIR program has brought a lot of people and ideas together during its first years of existence and created the FaIR advances of this publication. We look forward to the next phase and more experts to join.
I especially wish to thank Charles-Albert Lehalle who is scientifically responsible for FaIR and who has put in a lot of hours, ideas and network to build what FaIR is today. I also wish to thank Louis Bertucci who has joined more recently and is the editor in chief of this publication. And finally, I warmly thank all other contributors to the FaIR Advances whether they are round table participants, text contributors or part of the ILB team that helped this impressive collection of insights come to life.
AN ON-GOING PROCESS OF ASSESSING THE IMPACT OF NEW TECHNOLOGIES ON THE FINANCIAL AND INSURANCE SECTORS
Three years ago, Institut Louis Bachelier saw an increase of requests coming from the industry to finance collaborations with academia on different forms of machine learning and blockchain topics. This appetite to explore the potential added value of these new technologies on financial markets and for the insurance sector was not well organised; it seems closer to curiosity than the will of conducting strong research collaborations. It nevertheless fostered the interest of the scientific board of the Institute on these domains, raised the question of helping the industry to focus collaborative efforts on impacting projects. It has been the starting point of the “Finance and Insurance Reloaded” transverse research program.
We are currently in the first phase of this project, structured around more transparency and information sharing. We first investigated what could be the main fields of applications in a workshop at the Collège de France. The emerging themes have been: usages oriented towards clients of these sectors, internal usages of new technologies to improve risk intermediation, and usages improving the connection between the “real economy” and the financial and insurance sectors, essentially via “alternative data”. We also had to define with more accuracy the scope of these “new technologies”. Hopefully Institut Louis Bachelier is in contact with international experts, and discussions started with overseas academics, some of them joining our International Scientific Board later on. Moreover, we could leverage on reports issued by other organisations; I have in mind the report by Finance Innovation on “Intelligence artificielle, blockchain et technologies quantiques au service de la finance de demain”, i.e. “Artificial intelligence, blockchain and quantum computing for finance”. We decided to focus on A.I. and blockchain, because we had the sentiment that they would have more short term transformative impacts than quantum computing.
A big progress in our understanding of A.I. for finance stems from the observation of what the Turing Institute or the Center for Data Science of NYU put in place. This was in line with theoretical contributions of economists like Philippe Aghion, supporting the idea that A.I. is a “generic technology”. These technologies, like electricity or steam engines, need investments to generate “secondary innovations”. Without these supplementary efforts, one can only observe progress provided by A.I. for other usages or in other sectors, and fail to transfer them at minimal costs to her or his own domain. This reasoning supported the creation of “Instituts interdisciplinaires d’intelligence artificielle (3IA)” in France: one of the best way to foster the emergence of secondary innovations from A.I. is to put together experts of data sciences with invited experts of a specific domain with an identified topic to work together on, during a specified time to build an operative proof of concept. This proof of concept is then taken by the invited experts back in their department; not only this instance will spread, but these experts will now be able to have more ideas about potential innovations from A.I. around them.
On the blockchain side, our views have been shaped in several steps: first it is obvious for any professional that the blockchain itself has direct applications in the “post trade” space, it can prevent operational errors since it allows to operate simultaneously all the steps involved in a transaction. It will have an impact on the operation of middle and back offices of financial and insurance companies. Thinking about such a future raises questions about how many “blockchains” should sustain this new ecosystem; the answer clearly lays in the realm of the Network Economy. A third component of the impact of blockchain is to create new networks of trust, that can be for instance very useful for insurance companies or to assess some ESG scores. And the last consequence of the emergence
of the technology of blockchains is the need of a stable coin: to leverage at one hundred percent the efficiency of a blockchain, it is needed to be able to operate money in it. It is under optimal to host this money outside of the blockchain, since it will introduce a potential source of failure of a transaction, hence one needs to find a way to host “coins” with a value very close to a basket of external currencies inside the blockchain.
Last but not least, Institut Louis Bachelier wanted to keep a focus on risk management and regulation.
During the last two years, our main tools to improve the “advanced knowledge” on A.I. and blockchains for finance and insurance have been seminars and roundtables. A standalone workshop hosting academic talks and roundtables is co-hosted by FaIR and the French regulator ACPR; it gave birth to a series of transcriptions of “FaIR roundtables” that are widely used in this report to shed light on different topics of interest. Other roundtables have been generally hosted by conferences co-organised by Institut Louis Bachelier or by institutions close to it (like Euronext or the AFGAP). Frequent exchanges with the finance department of the Turing Institute, under the auspices of a partnership linking FaIR to this great Institute, has been very fruitful in the process of delivering insight about A.I..
This report gives an overview of the different topics that have been addressed during the last 18 months. The covid pandemic added some inertia to the work of putting together extracts of content produced by FaIR. Nevertheless, thanks to the effort of the ILB staff, readers will be able to make their own views on the implications of these technologies for the finance and insurance sectors. These contributions come from academics and professionals involved in designing innovations using these technologies. The choice of topics and speakers has been positively influenced during discussions with the International Scientific Committee of FaIR, whose members gently provided contributions to this report.
CHARLES-ALBERT LEHALLE
SENIOR RESEARCH ADVISOR, CAPITAL FUND MANAGEMENT,
SCIENTIFIC DIRECTOR OF FAIR AND VISITING RESEARCHER,
IMPERIAL COLLEGE LONDON
A FOREWORD FROM THE EDITOR-IN-CHIEF
This edition of FaIR’s Advances is the first annual report of the Finance and Insurance Reloaded (FaIR) interdisciplinary program hosted at the Institut Louis Bachelier.
This report is a collection of contributions of world renowned experts that I have had the chance to organise into this 3-part report. They present their point of view on how the finance and insurance landscape is, and will be, impacted by new technologies. From robo-advisors to machine learning and blockchains, this report explores some deep revolutions currently reshaping the distribution of financial products, the intermediation of risk and how the financial sector gets insights from the real economy.
First and foremost, I would like to thank all the contributors of this report. The members of the International Scientific Committee - ISC - (Darrell Duffie, Alexander Lipton, Peter Kolm and Cris Doloc) have taken the time to share their valuable insights on FaIR’s topics of interest. Other contributors include researchers with close relationship to FaIR (Lukasz Spruch, Blanka Horvath, Michel Crouhy and Aimé Lachapelle) as well as researchers with direct relationship to Institut Louis Bachelier (Christine Balagué and Christian Robert).
Second, I would like to thank Charles-Albert Lehalle, scientific director of the FaIR’s program, for giving me the opportunity to take part in the editing process of this report. Lastly, I also take the opportunity to thank the entire editing team at Institut Louis Bachelier for their dedicated work.
This report, like the FaIR program, is organized around 3 chapters. The first chapter focuses on how new technologies will impact the distribution of financial products to end-users. It is oriented toward the outside of the financial system. The second chapter is concerned with the inside of the financial, namely how financial actors will intermediate the risk within an increasingly digital world. The third chapter explores how financial institutions can leverage recent technologies to better understand the underlying economy, to better connect to the real economy.
Overall, each chapter is composed of all the relevant contributions from FaIR’s ISC, other researcher’s contributions, and excerpts from FaIR’s round tables. Indeed, during its first year of existence, six round tables have been organized by FaIR. This report presents some excerpts from the transcript of those round tables, put in the context of each of the three chapters.
The editing team hopes this report will shed light on important transformations that the finance and insurance industries are currently facing. FaIR’s research community is dedicated to delivering a comprehensive understanding of those transformations, and is committed to supporting all the parties involved, financial actors as well as national and supra-national agencies.
LOUIS BERTUCCI
RESEARCHER AT INSTITUT LOUIS BACHELIER
EDITOR-IN-CHIEF OF THIS REPORT
THE FAIR INTERNATIONAL SCIENTIFIC COMMITTEE (ISC)
The Finance and Insurance Reloaded Transverse Program leverages on the academic network of Institut Louis Bachelier. Since it is of paramount importance to have advices from experts outside academic working under the umbrella of the Institute, the FaIR program is fortunate to be in touch with experts from the best universities in the US (Stanford, New York University, University of Chicago and the Massachusetts Institute of Technology) in the domains of post-trade, Blockchain, robo-advising and the use of new technologies on financial markets.
Petter KOLM
Petter Kolm, Director of the Mathematics in Finance Master’s Program and Clinical Professor, Courant Institute of Mathematical Sciences, New York University.
Petter Kolm is the Director of the Mathematics in Finance Master’s Program and Clinical Professor at the Courant Institute of Mathematical Sciences, New York University. Previously, Petter worked at Goldman Sachs Asset Management where his responsibilities included researching and developing new quantitative investment strategies. Petter has coauthored many articles and books on quantitative finance and financial data science and financial data science, serves on several editorial boards for academic journals, professional associations, and company advisory boards. He holds a Ph.D. in Mathematics from Yale, an M.Phil. in Applied Mathematics from the Royal Institute of Technology, and an M.S. in Mathematics from ETH Zurich.
Cris DOLOC
Cris Doloc is an accomplished Quantitative & Computational technologist with more than 25 years of experience in Enterprise Software Architecture, Machine Learning and High Performance Computing. He holds a PhD in Computational Physics and he has spent the last two decades in the field of Quantitative and Computational Finance working for several top-tier financial firms. As such He has been the Chief Technology Officer of Terra-Nova Financial, the Head of Valuation Infrastructure at Chicago Trading Company and the Founder & Principal of Quantras Research Ltd. He is currently developing FintellegeX which is an Ed-Tech platform and Quantitative and Computational Learning Academy. He is also teaching at the University of Chicago in the Program of Financial Mathematics.
Alexander LIPTON
Alexander Lipton is Co-Founder and Chief Information Officer at Sila, Partner at Numeraire Financial, Visiting Professor and Dean’s Fellow at the Hebrew University of Jerusalem, and Connection Science Fellow at MIT. He is an Advisory Board Member at numerous Fintech companies worldwide. In 2016 he left Bank of America Merrill Lynch, where he served for ten years in various senior managerial roles including Quantitative Solutions Executive and Co-Head of the Global Quantitative Group. Before switching to finance, Alex was a Full Professor of Mathematics at the University of Illinois and a Consultant at Los Alamos National Laboratory. His current professional interests include FinTech, particularly, applications of distributed ledger technology to payments and banking, digital currencies, including stablecoins and asset-backed cryptocurrencies, robust asset allocation, automated investing, balance sheet optimization and industrial-strength risk management systems for large systemically important financial institutions. In 2000 Alex was awarded the first ever Quant of the Year Award by Risk Magazine. Alex published eight books and more than a hundred scientific papers. He is currently finishing his next book (with Adrien Treccani) “Blockchain and Distributed Ledgers: Mathematics, Technology, and Economics” which will be published in the beginning of 2021.
Darrell DUFFIE
Darrell Duffie is the Adams Distinguished Professor of Management and Professor of Finance at Stanford University’s Graduate School of Business and Professor by courtesy in the Department of Economics. Duffie is a Research Fellow of the National Bureau of Economic Research and a Fellow of the American Academy of Arts and Sciences. He was the 2009 president of the American Finance Association. Duffie is an independent director on the board of U.S. Dimensional Funds. He chaired the Financial Stability Board’s Market Participants Group on Reference Rate Reform. Duffie is a Project Advisor of The G30 Working Group on Digital Currencies and a member of the Systemic Risk Council. Duffie’s research focus is the design and regulation of financial markets. His most recent books include How Big Banks Fail (Princeton University Press, 2010), Measuring Corporate Default Risk (Oxford University Press, 2011), Dark Markets (Princeton University Press, 2012), and Fragmenting Markets: Post-Crisis Bank Regulations and Financial Market Liquidity (forthcoming, 2020).
Moreover, the FaIR Transverse Program has access to experts from the Alan Turing Institute in the UK thanks to a partnership with this institute.
# GENERAL SUMMARY
## DISTRIBUTION OF PRODUCTS
**NEW TECHNOLOGIES PROVIDE A BETTER INSIGHT ON CLIENTS’ NEEDS**
**ISC CONTRIBUTION**
INVESTMENT ADVICE IS ONLY AN APP AWAY: ROBO-ADVISORS TODAY AND TOMORROW
**FAIR NETWORK CONTRIBUTOR**
CHRISTINE BALAGUÉ
**FAIR NETWORK CONTRIBUTION**
GOOD IN TECH’S VISION ON «CUSTOMIZATION OF FINANCIAL PRODUCTS AND CUSTOMER EXPERIENCE IMPROVEMENT».
**ROUND TABLE SPEAKERS**
PIERRE ALAIN DE MALLERAY
AIMÉ LACHAPELLE
PHILIPPE TRAINAR
DAVID DUROUCHOUX
MARK SCHUMMER
PHILIPPE MAUPAS
MATTEO RAVA
JEAN-PHILIPPE BARJON
SANDRINE LEMRY
**NEW INFRASTRUCTURES TO BETTER SERVE CLIENTS**
**ROUND TABLE: EXCERPT 1 NEW CHALLENGES IN INSURANCE**
**ROUND TABLE: EXCERPT 2 RESOLUTION OF POST-TRADES VIA A DISTRIBUTED LEDGER**
**NEW CHALLENGES FOR RISK MANAGEMENT AND REGULATORS**
**ROUND TABLE: EXCERPT 3 ROBO-ADVISORS**
**ROUND TABLE: EXCERPT 4 NEW CHALLENGES IN INSURANCE**
## INTERMEDIATION OF RISK
**IMPROVING RISK INTERMEDIATION THANKS TO NEW TECHNOLOGIES**
**ISC CONTRIBUTIONS**
INTEROPERABLE PAYMENT SYSTEMS AND THE ROLE OF CENTRAL BANK DIGITAL CURRENCIES
STABLE COINS AND THEIR ROLE IN TRANSFORMING THE FINANCIAL ECOSYSTEM
DATA DRIVEN DECISION MAKING IN TRADING AND INVESTING
**FAIR NETWORK CONTRIBUTORS**
LUKASZ SPRUCH
BLANKA HORVATH
MICHEL CROUHY
DAN GALLAI
ZVI WEINER
**FAIR NETWORK CONTRIBUTION**
MODEL BASED MACHINE LEARNING
ON THE TRANSFORMATIVE ROLE OF NEW TECHNOLOGIES ON MARKET MODELS IN QUANTITATIVE MODELLING
THE IMPACT OF FINTECHS ON FINANCIAL INTERMEDIATION: A FUNCTIONAL APPROACH
## ROUND TABLE SPEAKERS
SANDRINE UNGARI
CHARLES-ALBERT LEHALLE
NICOLE EL KAROUJ
## ROUND TABLES DEEP LEARNING VS. THEORY: ILLUSTRATION WITH DEEP HEDGING
## BETTER CONNECTION TO THE REAL ECONOMY
## MORE DATA AND BETTER INFORMATION PROCESSING
**FAIR NETWORK CONTRIBUTORS**
AIMÉ LACHAPELLE
CHRISTIAN ROBERT
**FAIR NETWORK CONTRIBUTION**
RESPONSIBLE AI IN FINANCE AND INSURANCE: SHIFTING FROM CONCEPT TO ACTION
NEW DATA AND PROCESS IMPROVEMENTS IN THE INSURANCE INDUSTRY
**ROUND TABLE SPEAKERS**
CHARLES-ALBERT LEHALLE
HELMUT PASCHE SECHEVAL
OUSSAMA CHERIF
BRUNO DURAND
ANNE-SOPHIE TAILLANDIER
STEPHANE HERBIN
ALAIN TROUVÉ
NICOLAS VATATIS
**ROUND TABLES: EXCERPT 1, 2, 3, 4 ALTERNATIVE DATA : TOWARDS NEW CORPORATION GOVERNANCE AND PRICE FORMATION PARADIGM ?**
**ROUND TABLES: EXCERPT 5, 6, 7 ARTIFICIAL INTELLIGENCE, MATHEMATICS AND INDUSTRY**
## LIST OF ROUND TABLES
One of the most important challenges of the financial system is to leverage new technologies in order to provide a tailored experience to end-users. Like many other industries, the financial system is subject to heavy competition from small new businesses (startups - fintech) as well as from new forms of infrastructures.
The increase in competition is partly due to the advent of new technologies and it has led to a tremendous amount of innovation. To be more specific, new technologies refer to the advent of artificial intelligence and process automation but also, maybe more importantly, to the wide availability of communication networks through internet-connected devices (smartphones and high speed internet, but also secure communications, online banking, etc.). This has opened the way for more direct innovation toward the outside of the financial system, toward end-users.
Financial companies, including those from the insurance sector, have expertise in transforming and transferring risks, however small and new companies are coming after the user experience. Large companies have to adapt and find a way to innovate not to be hit too much by newcomers.
On the one hand, the client experience is put at the center of the decision and the development process. Along with other sectors, clients of the financial sector are being more and more accustomed to a personalised experience when they interact with the financial system. One of the most important instances of such a personalized experience are robo-advisors. Here “advisor” has to be understood in the general sense. The goal is not only to advise clients on the investments they should make, but the experience can be much more personalized. From tax loss harvesting to investment based on life events and life goals, all aspects of the investment process can be tailored to fit the needs of each client.
On the other hand, the whole process may be automated with limited human intervention, which induces important cost savings. AI, coupled with automation, allows new companies to provide a better user experience with less costs. Nonetheless, financial actors are not currently replacing every human with algorithms but rather use algorithms to leverage the capabilities of humans. This allows portfolios to grow in size beyond what a single individual can manage by himself, and allows internal trading decisions to be assisted by technology.
The impact on the insurance sector has also been very important. Despite the insurance business being somewhat different, clients usually interact a lot with their insurance provider. Therefore, a straightforward way to improve user experience is with claim processes. Because of their very nature, insurance companies are also using new technologies like AI to refine their segmentation models. Segmentation is a real challenge because the regulatory framework mostly does not allow it to be performed at a very granular scale, even though insurance providers (or even other companies, like GAFA) may have enough data to do this.
On the infrastructure side, blockchains represent a big competitor to the financial sector. Tokenization allows the creation of new asset classes that have the ability to reach an even larger set of investors and issuers. Financial institutions need to adapt to this new infrastructure that may become a new paradigm.
This poses important challenges to regulatory agencies. Indeed, fintech are currently attacking several functions of the traditional financial system at the same time. They are able to use the technology in such a way that it induces an unbundling of the core functions of banking. The heavy regulation imposed on banks could be one reason for which fintech are able to gain some market share in the competitive sector.
This chapter features a set of two short papers including one from a member of the International Scientific Committee (ISC) and one from a member of one of FairR’s research programs, as well as a condensate of relevant excerpts from FairR’s round tables. First, Petter Kolm (ISC) from NYU shares his view of the current and future state of robo-advisors. Second, Christine Balagué from Institut Mines-Télécom business school presents her view on personalisation and improvement of the user experience.
**INVESTMENT ADVICE IS ONLY AN APP AWAY: ROBO-ADVISORS TODAY AND TOMORROW**
Petter KOLM,
Director of the Mathematics in Finance Master’s Program and Clinical Professor, Courant Institute of Mathematical Sciences, New York University.
1. **WHAT ARE ROBO-ADVISORS?**
Advances in fintech have led to the development of easy-to-use online platforms referred to as robo-advisors or digital-advisors, offering automated investment and portfolio management services to retail investors.\(^1\) By leveraging algorithms embodying well-established investment principles and the availability of liquid ETFs for many asset classes, robo-advisors automatically manage client portfolios that deliver similar or better investment performance at a lower cost as compared to traditional financial retail services.
As of 2020, assets under management (AUM) by robo-advisors world-wide is about $990B and is expected to grow at an annual rate of about 26% to a total of $2.5T by 2024 (Statista, 2020). U.S. is by far the leading robo-market with about $680B in AUM and 8.8M users, where the largest firms include Vanguard Personal Advisor Services with $140B in AUM, Schwab Intelligent Portfolios ($40B), Wealthfront ($20B), and Betterment ($18B) (Statista, 2020; Backend Benchmarking, 2020c).\(^2\)
First entering the investing scene after the financial crisis in 2008, robo-advisors represent perhaps the greatest innovation in retail investing since the introduction of index funds and discount brokerages in the seventies and ETFs in the early nineties (Kador, 2002; Lynch and Rothschild, 1996; Wiandt and McClatchy, 2001). While their initial success is often attributed to the interest they received amongst millennials, who are open to new online technologies and mobile apps, today’s average robo-advisor client in the U.S. is in their 40s and has an account balance around $20K, suggesting a broadening of the client base (Kaya, 2017; Hayes, 2019).
2. **HOW DO ROBO-ADVISORS WORK?**
By and large, investors are responsible for the choices they make when selecting investments. However, because of time constraints and complexity of investment decisions, many retail investors rely on professional advice and services, whether from more traditional registered financial advisors and broker-dealers, or from the more recent robo-advisors. The majority of robo-advisors in the U.S. limit their advice to portfolio management, including that of allocating investments amongst asset classes, and may otherwise provide only limited advice about other aspects of financial planning, such as estate and retirement planning, and cash-flow management.
2.1. **Core Principles of Retail Investing.** Broadly speaking, whether a novice or seasoned retail investor, there are several core investing principles that apply to them, including:
- Establish an investment plan and objectives,
- Seek broad diversification,
- Weight investment cost and value,
- Account for taxes.
Establishing an investment plan involves much more than picking a few stocks, mutual funds or ETFs to invest in. For instance, it is important to consider one’s current financial situation and
goals, investment timeline and risk appetite.
First coined by Miguel de Cervantes, the author of Don Quixote, in the early 1600s, “don’t put all your eggs in one basket” is perhaps the most well-know metaphor expressing the investment advice of the benefits of diversification. Many decades of academic research and centuries of practical experience have shown the importance of diversifying across asset classes and investment themes. Seeking broad diversification should be one of the main goals of any retail investment strategy. In the absence of views about asset returns, the most diversified portfolio is the market portfolio.
Any investment process needs to weigh the cost of exposure to the assets with their added value. While this is common sense, it is “easier said than done” as costs come in many different forms, such as transaction and trading costs, management and advisor fees, and taxes to name a few.
For retail investors tax considerations and tax optimization are critical as a significant part of their investments are held in taxable accounts. We will come back to this topic below.
2.2. From Investing Principles to Algorithms. It is not surprising that robo advisors have incorporated the core principles from Section 2.1 in their services and product offerings. From a broad perspective, most robo-advisors have integrated them as a three step process:
(1) Client assessment and onboarding,
(2) Implementation of the investment strategy, and
(3) Ongoing management of the investment strategy, where each step is fully, or at least to a large extent, automated.
2.2.1. Client Assessment and Onboarding. Most commonly, a robo-advisor provides a new client with an automated online survey to collect general and investment specific information, including their age, net worth, investment goals, risk capacity and risk tolerance (Andrus, 2017). Goals may include generating income, saving for retirement, planning for large future expenditures (such as the purchase of a house or car) and/or establishing a financial safety net for emergencies. This automated evaluation represents a big change as compared to traditional wealth management services that rely on an initial in-person consultation. While less personal, the online assessments are less time-consuming and offer great cost-savings over the traditional approach. It is no wonder that many clients prefer the simplicity and ease of those robo-advisors who have onboarding processes that take no more than fifteen minutes to complete (Lo, Campfield, and Brodeur, 2018).
2.2.2. Implementation of the Investment Strategy. Robo-advisors use algorithms embodying well-established investment principles to automatically construct and periodically rebalance a diversified portfolio of the largest and most liquid ETFs. The most commonly used approach by robo-advisors to build and manage portfolios is based on modern portfolio theory (MPT), also referred to as mean-variance optimization (MVO), introduced by Markowitz (1952). In its simplest form, MPT provides a framework for constructing a portfolio by choosing the amount to invest in each asset such that the expected return of the resulting portfolio is maximized at a prespecified level of risk as measured by portfolio volatility. Some robo-advisors use various extensions of MPT to incorporate additional features in their mod els such as transaction costs, tax lots, other risk specifications and the ability to incorporate subjective views in the portfolio construction process.
Robo-advisors in the U.S. predominately use passive ETFs in their offerings. Passive ETFs can be traded at low cost throughout the day and be used efficiently for tax-loss harvesting (TLH). The purpose of TLH is to realize current losses that can later be offset against future gains, as described below.
Moreover, the robo-advisors’ usage of automation and passive investment strategies reduce risks of internal agency conflicts and conflicts of interest that traditionally could arise between financial advisors and their clients (Inderst and Ottaviani, 2009). Needless to say, conflicts of interest cannot be completely eliminated as they naturally arise in situations of asymmetric information, including that of robo advisory.
2.2.3. Ongoing Management of the Investment Strategy. An important aspect of robo-advisory services is the ongoing monitoring and rebalancing of client portfolios. The algorithms perform rebalancing in three main situations: (a) when due to market movements, portfolio holdings drift too far away from their desired target allocation; (b) when tax-loss harvesting opportunities are identified; and (c) when clients update their preferences. However, as robo-advisors design their portfolio strategies for the long-term, annual turnover is low.
Robo-advisors permit clients to override their algorithms in several ways, including changing portfolio allocations and modifying their risk profile and preferences. Unnecessary client overrides can trigger significant trading and tax consequences that are far from optimal. Many robo-advisors use realtime automated messages on their platforms and mobile apps to warn their clients against this behavior.
3. AUTOMATED TAX MANAGEMENT FOR RETAIL INVESTORS
One of the core principles of retail investing is that any portfolio strategy should be tax optimal. There are many ways in which to address taxes, some simpler and others more complex. Besides diversification and automatic rebalancing, one of the most valuable services robo-advisors provide is automated tax management.
Constantinides (1984) showed that it is optimal to realize capital losses in stocks immediately and to defer capital gains for as long as possible. A common approach is to take the strategic asset allocation as given and overlay “tax algorithms” either at the account level or the trading level to generate so-called tax alpha through tax-loss harvesting and asset location.
3.1. Tax-loss harvesting. Tax-loss harvesting (TLH) is a strategy where assets held in the portfolio at a loss are sold opportunistically (Jeffrey and Arnott, 1993; Stein and Narasimhan, 1999). When losses are realized, they can be used to off set future capital gains and income from dividends. While TLH traditionally has been performed on a quarterly or annual frequency, computer algorithms can continuously monitor and act on opportunities as they arise. Hence, robo-advisors can significantly increase the number of TLH opportunities relative to traditional investment managers.
The so-called wash-sale rule can make TLH a complex endeavor. A wash sale occurs when you sell an asset at a loss and then buy that same asset or “substantially identical” assets within a window of thirty days before or after the sale date. The wash-sale rule was designed to discourage investors from selling an asset at a loss to claim a tax benefit, again and again. One can navigate the wash-sale rule in a few different ways. A basic approach is to sell a ticker at a loss and buy a “dual” ticker to replicate the exposure of the original ticker. For instance, one might sell the holdings in an ETF tracking the Russell 1000 index and later buy back an ETF tracking the S&P 500.
Using ETFs for TLH works well for several reasons. First, ETFs require authorized participants to create and redeem shares in kind, thereby enabling the ETF to avoid selling securities and realizing capital gains taxes to meet redemptions. Second, the ETF manager can reduce the ETF’s tax liability by providing the authorized participant with the tax lots that have the lowest cost basis. With the dramatic increase of highly liquid ETFs in different sub-asset classes, identifying dual tickers is easy.
On the flip-side of TLH is the need to realize long-term capital gains to reset the cost basis, thereby preparing for higher short-term capital losses in the future. Naturally, there is a tax cost to recognizing the capital gain, but doing so restarts the holding period and provides
the investor with the option to recognize future capital losses (Stein, Vadlamudi, and Bouchey, 2008; Yang and Meziani, 2012).
3.2. Asset Location. While maybe not as broadly known as it should be and often misunderstood, asset location is another important tax overlay strategy. Asset location should not be confused with asset allocation.
The idea of asset location is that assets have different after-tax profiles independent of whether they are held in taxable or tax-advantaged accounts. In other words, the after-tax return of an asset can be very different if held in a tax-deferred, tax-exempt or taxable account. For example, the coupon payment on a bond held in a taxable account is taxed as ordinary income. In this instance, if possible, an investor should instead hold the bond in a tax-exempt account. Consequently, as retail investors may have a number of taxable, tax-deferred and tax-exempt accounts, some robo-advisors can assist clients by optimally allocate assets preferentially to the different accounts so as to maximize the after-tax return while the overall strategic allocation is maintained (Khentov, 2016; Huang and Kolm, 2019).
4. TRENDS AND DEVELOPMENTS
The fintech landscape continues to evolve rapidly. Main trends in the robo advisory space include greater personalization and customization, improved integration of services and platforms, and increased automation. In the modern world, autonomous finance has become the new norm, where algorithms assist us in making financial decisions, invest in a more disciplined fashion in line with our preferences, ensure we save long-term for retirement and smartly manage our outstanding debts. A recent study suggests that close to 60% of the U.S. population will be using robo-advisors by 2025 (Schwab, 2018).
4.1. Expanding Service Offerings. In this new world where robo-advisors, and technology companies more broadly, may become the gatekeepers of the access to banking services, an expansion of services is crucial in order to compete with traditional banks. Many robo-advisors have moved in this direction and are offering services including cash and checking accounts, debit cards, lending and retirement services (McCann, 2020). Recognizing that automation cannot replace human touch everywhere, some robo-advisors are offering customers financial advice from certified financial planners on staff who can assist in making decisions such as how to start investing; address significant life events (changing job, having a child, purchasing a home, etc.); plan for college, marriage and retirement, to name a few.
4.2. Is Smart Beta Investing Ripe for Robo-Advisors? A well-trodden path in investment management is that innovative products are first introduced in institutional contexts, and only with a significant delay are they later, gradually, made available in the retail space. Such has been the case with smart beta offerings. However, today, liquid smart beta ETFs are more broadly available. Surprisingly though, there are few smart beta products available amongst robo-advisors.
In the institutional smart beta space, smart beta ETFs have seen increased interest due to improved technology, reduced costs and an evergrowing body of empirical evidence of what drives underlying risk premia. Because of this evolution, the retail advice market today has a strong foundation to build upon when implementing smart beta solutions. Huang and Kolm (2019) argue that smart beta is ripe for the retail audience and discuss some of the challenges in implementing smart beta in robo-advisory offerings.
Based on a recent survey, Agather and Gunthorp (2018) suggest that smart beta products are increasingly popular amongst financial advisors across Canada, U.K. and the U.S. for the purpose of diversifying client portfolios and to express strategic views. We believe that the continued increase in liquid smart beta ETFs will provide robo-advisors an opportunity to increase portfolio customization to better fit investment objectives and financial goals of retail investors.
4.3. Goals-Based Investing. As discussed earlier, maintaining a broadly diversified investment portfolio is a core investment principle for retail investors. As each individual has different financial goals and risk profiles, there is no “one size fits all.” Financial theory prescribes that an individual’s total assets and liabilities should be considered when constructing their investment portfolio. Also the more illiquid assets, such as that of an individual’s home, should be included in the robo-advisor’s asset allocation decision. This will result in a portfolio of assets with lower correlation to the housing market.
It is well-known that individuals do not treat all of their investments the same, but rather practice what is referred to as mental accounting (Thaler, 1985; Thaler, 1999). In particular, it has been demonstrated that individuals will attach different “chunks” of money to different risk-return preferences, depending on how they see that money being used in the future. An individual may view their homeownership differently from that of their stock portfolio. For example, they may tolerate a larger loss in their stock portfolio, but not willing to risk losing their home.
Goals-based wealth management is an investment and portfolio management approach that focuses directly on investors’ financial goals. Shefrin and Statman (2000) suggest, in behavioral portfolio theory (BPT), that investors behave as if they have multiple mental accounts. Each mental account has varying levels of aspiration, depending on its goals. BPT proposes a portfolio management framework where investors are goal-seeking (aspirational) while remaining concerned about downside risk. Specifically, rather than to trade off return versus risk as in MVO, investors should trade off goals versus safety. Not surprisingly, BPT leads to normatively different statements about the optimal portfolio than those based MPT (see, for example, Das, Ostrov, Radhakrishnan, and Srivastav (2018)).
Based on its intuitive appeal and ability to model individual investor’s financial goals in a flexible and highly customizable way, we believe that goals-based wealth management will continue to evolve and may emerge as the predominant approach in retail investment management.
4.4. Responsible Investing. When considering investment choices, individuals have in recent years gradually become more concerned about socially responsible investing (SRI) and pay greater attention to the environmental, social and governance (ESG) practices underlying an investment.
There are several challenges for robo-advisors here. First is to find liquid ETFs that can be used for constructing SRI/ESG-aware portfolios. Second, as investor’s SRI/ESG preferences vary, it is difficult for robo-advisors to provide the customization needed with the currently limited number of SRI/ESG ETFs. Some people argue that SRI/ESG preferences may be best customized at the stock level rather than through ETFs.
4.5. Financial Literacy and Investor Education. Rich with technical terminology and jargon, for many of us financial services and products can be intimidatingly complex. In a modern society investor education is needed in order to improve individuals’ financial literacy. At the core of financial advice and planning is communication (Lusardi, 2015).
Needless to say, there are costs to society for a financially uninformed population as we may end up paying for our mistakes. Unmistakably, there are clear benefits in having citizens that have healthy financial habits and plan for their future. Who should provide such education? First, perhaps middle and high-schools could adopt course content on basic personal finance. Second, financial advisors and other fiduciaries could educate their clients about investment management and planning for retirement. Third, employers could play a role in providing employees with information and continued education about personal finance.
5. HOW DO ROBO-ADVISORS AND THEIR CLIENTS REACT IN BEAR MARKETS?
The introduction of the first robo-advisors in 2008 and their subsequent expansion has coincided with the longest bull market in history. Consequently, over the years there has been concerns about how robo-advisors and their clients will react when markets goes bearish. We have had to wait for more than ten years for a market shock such as that caused by the COVID-19 pandemic during the spring of 2020 where the S&P 500 index fell more than 25%. Specifically, Backend Benchmarking (2020a) reports that from January through mid-March in 2020, robo-advisors declined on average 17.6%, as their equity and fixed income holdings fell about 29.2% and 2.3% on average, respectively. Not surprisingly, the robo-advisors with broader diversification towards treasuries and investment-grade fixed income fared better than their peers.
The significant market drop provided tax-loss harvesting opportunities for robo advisors. For example, Betterment and Schwab traded over 60% of their accounts to realize losses on behalf of clients (Backend Benchmarking, 2020).
During this period, some robo-advisors notably increased their direct client engagement in several ways, including the usage of blog posts and online videos, to educate them about market volatility and the importance of investing with a long-term perspective, thereby discouraging clients from moving assets or overriding the algorithms. Those robo-advisors that followed this path appear to have been successful in helping their client stick to their investment objectives. Some robo-advisors reported that an increased number of clients reached out for advice from financial advisors on their staff. For instance, client engagement with Betterment advisors was 50% higher in March as compared to January in the same year (Carlson, 2020).
6. CONCLUSIONS
More than ten years in the making, robo-advisors have continued to grow both in size and product offerings. The main reasons contributing to the continued success of the robo-advisors include:
• Low cost. Fully automatic algorithm-driven management of client portfolios that significantly lowers the cost of financial advice and wealth management.
• Personalization and customization. By providing a general investment management framework and a suite of financial services, robo-advisors can in a highly scalable fashion customize investment strategies and provide a digital banking experience that suits the specific needs of each individual investor.
• Anywhere, anytime convenience. People have gotten used to accessing their digital lives and beyond through mobile apps on their phones and laptops. Robo-advisors provide their clients with this convenience for their investment portfolios and other aspects of their financial life: anywhere, anytime.
• Wealth management services for the masses. Robo-advisors are making many sophisticated investment and financial advisory services, that in the past were only accessible to high net worth individuals, available to all retail investors at low cost.
In closing, during the spring of 2020 robo-advisors demonstrated they can stay on course and support the needs of their clients during a period of significant market turmoil. This recent experience demonstrates that the robo-advisory industry is maturing and able to offer a broad suite of investment management and financial advisory services to their clients, whether in up or down markets.
REFERENCES
Agather, Rolf and Peter Gunthorp (2018), Smart Beta: 2018 Global Survey Findings from Asset Owners. Tech. rep. FTSE Russell. url: https://investmentnews.co.nz/wp-content/uploads/Smartbeta18.pdf
Andrus, Danielle (2017). 4 Ways Robo-Advisors Improve Client Onboarding. url: https://www.thinkadvisor.com/2017/06/16/4-ways-robo-advisors-improve-client-onboarding/.
Backend Benchmarking (2020a). How Do Robos React During a Bear Market? url: https://www.backendbenchmarking.com/blog/2020/03/how-do-robos-react-during-a-bear-market/.
(2020b). Robo Advisor News Q1 2020. url: https://www.backendbenchmarking.com/blog/2020/03/robo-advisor-news-q1-2020/.
(2020c). The Robo Report - First Quarter 2020. url: https://www.backendbenchmarking.com/the-robo-report/.
Robo-Advisors Kept Investors Calm During Turmoil - With Help From Humans at Times (2020), url: https://www.barrons.com/articles/tesla-stock-has-surged-kimbal-musk-made-his-first-sale-of-shares-in-2020-51591441237.
Constantinides, George M. (1984). "Optimal Stock Trading with Personal Taxes: Implications for Prices and the Abnormal January Returns". In: Journal of Financial Economics 13.1, pp. 65–89.
Das, Sanjiv R., Daniel Ostrov, Anand Radhakrishnan, and Deep Srivastav (2018). "A New Approach to Goals-Based Wealth Management". In: Journal Of Investment Management 16.3, pp. 1–27.
Hayes, Adam S. (2019). "The Active Construction of Passive Investors: Roboadvisors and Algorithmic 'Low-Finance'". In: Socio-Economic Review, pp. 1–28.
Huang, Lisa and Petter N. Kolm (2019). "Smart Beta Investing for the Masses: The Case for a Retail Offering". In: Equity Smart Beta and Factor Investing for Practitioners. Ed. by Khalid Ghayur, Ronan G. Heaney, and Stephen C. Platt. Wiley. Inders.
Roman and Marco Ottaviani (2009). "Misselling Through Agents". In: American Economic Review 99.3, pp. 883–908.
Jeffrey, Robert H. and Robert D. Arnott (1993). "Is Your Alpha Big Enough to Cover Its Taxes?" In: Journal of Portfolio Management 19.3, pp. 15–25.
Kador, John (2002). Charles Schwab: How One Company Beat Wall Street and Reinvented the Brokerage Industry.
John Wiley & Sons. Robo-Advice – A True Innovation in Asset Management (2017). Deutsche Bank Research.
Khentov, Boris (2016). Asset Location Methodology. url: https://www.betterment.com/resources/asset-location-methodology/.
Onboarding: The Imperative to Improve the First Experience (2018). Broadridge. url: https://www.broadridge.com/white-paper/onboarding-the-imperative-to-improve-the-first-experience
Lusardi, Annamaria (2015). "Financial Literacy: Do People Know the ABCs of Finance?" In: Public Understanding of Science 24.3, pp. 260–271.
Lynch, Peter and John Rothschild (1996). Beating the Street. Simon & Schuster.
Markowitz, Harry M. (1952). "Portfolio Selection". In: Journal of Finance 7.1, pp. 77–91.
McCann, Bailey (2020). "Robo Advisers Keep Adding On Services". In: Wall Street Journal. url: https://www.wsj.com/articles/robo-advisers-keep-adding-on-arms-11583331556?shareToken=st1c2c56b0fc8e4db3b2fe78860caf2490.
The Rise of Robo: Americans’ Perspectives and Predictions on the Use of Digital Advice (2018). Charles Schwab.
Shefrin, Hersh and Meir Statman (2000). “Behavioral Portfolio Theory”. In: Journal Of Financial And Quantitative Analysis 35.2, pp. 127–151.
Statista (2020). Robo-Advisors - Worldwide. url: https://www.statista.com/outlook/337/100/robo-advisors/
Stein, David M. and Premkumar Narasimhan (1999). “Of Passive and Active Equity Portfolios in the Presence of Taxes”. In: The Journal of Wealth Management 2.2, pp. 55–63.
Stein, David M., Hemambara Vadlamudi, and Paul W. Bouchey (2008). “Enhancing Active Tax Management Through the Realization of Capital Gains”. In: The Journal of Wealth Management 10.4, pp. 9–16.
Thaler, Richard H. (1985). “Mental Accounting and Consumer Choice”. In: Marketing Science 4.3, pp. 199–214. – (1999). “Mental Accounting Matters”. In: Journal Of Behavioral Decision Making 12.3, pp. 183–206.
Christine BALAGUÉ
Christine Balagué is professor and chairholder of the Good in Tech Chair (www.goodintech.org) at Institut Mines-Télécom Business School on responsible digital innovation. Her research focuses on modeling the behavior of connected individuals (social networks, artificial intelligence algorithms, connected objects), as well as on technology ethics and more specifically artificial intelligence.
Christine Balagué is also a member of the CSA expert committee on online disinformation, a member of the defense ethics committee and a member of the impact commission on the recommendations of the Haute Autorité de Santé. She is also a member of the board of the Dataia convergence institute (Data Sciences, Intelligence and Society) and of the Board of Directors of Cap Digital. As Vice-President of the French National Digital Council from 2013 to 2016, she has participated in various projects submitted to the French government on the major digital challenges (Net Neutrality, Platform Neutrality, e-inclusion, e-education, e-health, Digital Ambition).
She is also the author of more than 90 publications in international scientific journals and conferences, as well as several books on digital and society. Christine Balagué has a PhD in Management Sciences from HEC, a degree from ESSEC and a Master’s degree in Econometrics from ENSAE. She is also recipient of the French National Order of Merit.
GOOD IN TECH’S VISION ON «CUSTOMIZATION OF FINANCIAL PRODUCTS AND CUSTOMER EXPERIENCE IMPROVEMENT».
Christine BALAGUÉ,
Professor and chairholder of the Good in Tech Chair (www.goodintech.org) at Institut Mines-Télécom Business School on responsible digital innovation.
Interactions between customers and companies in the financial sector are increasingly covered by new technologies. Artificial intelligence and data analysis tools are playing an growingly important role, aiming to improve customer experience and develop financial product customization. However, these technologies raise ethical concerns. For instance, there are currently many automatic tools for granting bank credit using machine learning. These tools create a score for each credit applicant using increasingly customized and targeted data. A growing academic literature in social sciences shows that these tools can be biased and discriminate against certain minorities. In addition, credit allocation decisions made by a Machine Learning algorithm can be opaque, rendering it difficult to provide an explanation to the credit applicant following an attribution decision. Lastly, the increasingly personalized targeting of these automatic tools requires the acquisition of more and more data on bank customers, which raises privacy and confidentiality concerns. Regarding this issue, one of the winning projects of the Good in tech February open call develops an “ethics by design”-Machine Learning algorithm interface for the attribution of bank credits. It will consist in creating an interface enabling arbitration between these different ethical issues (fairness, interpretability and privacy) in order to create efficient credit attribution algorithms. In addition, it will create a workshop-type approach to open a debate on these algorithms by associating technical and non-technical bank staff in the configuration of these tools.
Another subject concerns the customization of financial services through intelligent voice assistants such as Google Home or Alexa. These systems, which dominate their market, are increasingly being adopted (75% of American households will be equipped with them by 2024) because of their user-friendliness. This variable has been known as a major factor in the field of technology acceptance models (TAM models) for more than thirty years now. However, voice assistants are nowadays black boxes. This raises ethical issues of explicability, transparency, and non-discrimination measures through their response selection algorithms. Similarly, many ethical concerns are also raised by recommendation systems based on machine learning or deep learning, which create barriers and present endogenous biases.
Finally, technologies such as blockchain deserve to be studied in terms of ethical and responsible implications. Indeed, this technology based on distributed systems could be considered as more ethical and responsible. However, the opacity of these systems, and the algorithms making up the blockchain, also raise ethical concerns that need to be addressed.
Several works in progress of the Good in Tech Chair deal with these different topics. The contribution of the Good in Tech Chair to the FaIR program would help deepen these research themes, participate in interdisciplinary work, and develop collaborations with other existing Chairs within the Institut Louis Bachelier.
**Pierre-Alain DE MALLERAY**
CEO, Santiane
**Aimé LACHAPELLE**
Aimé is co-founder and Managing Partner of Emerton Data, a company specialized in AI and data transformation. He has over 13 years of experience in initiating and leading large data & AI projects, in multiple environments from start-ups to large groups.
Before founding Emerton Data, Aimé was successively Head of Pricing Innovation with Axa and Director Data Science with Capgemini Invent. He conducted end-to-end projects involving data and technology, with a focus on value delivery, mainly in the financial and industrial sectors.
Aimé has developed a deep expertise in insurance, and functional expertise in innovation, data-driven pricing, advanced analytics and machine learning. Aimé holds a PhD in Applied Mathematics from Université Paris-Dauphine.
**David DUROUCHOUX**
Deputy CEO Société Générale FORGE - Client relationship, business development, CBDC & central banks coverage.
**Mark SINSHEIMER**
Mark is an independent consultant and trainer to asset management firms, institutional investors and financial regulators on international best practices. He is also Associate Professor of Finance at Skema and EDHEC Business Schools. Previously, Mark had board level responsibilities with global asset management companies from 1996 to 2002 as Head of Marketing and Sales for Credit Lyonnais Asset Management and Head of Business Development for CDC Asset Management. Before, he was Product specialist for Paribas Asset Management and Trader for Credit Lyonnais.
Mark has a BA in History, MA in International Relations and a Graduate Degree in Law from Paris V University. He is a CFA charterholder and passed CAIA level 1 & 2.
Mark founded CFA France and was its Advocacy Chair until 2011. He is an active volunteer for the CFA Institute where he served on the Annual Conference Committee, Global Advisory Committee, European Advocacy Committee, Candidate Curriculum Committee, Standards and Practice Council and Advisory Council of INSEAD’s “Global Investors Workshop”. He was a member of the Governing Council of the European Asset Management Association where he chaired EAMA’ working group on index construction best practices. He is regularly interviewed by the financial press or invited to speak in forums and conferences.
**Philippe TRAINAR**
Philippe Trainar is Professor of the insurance chair at the Conservatoire National des Arts et Métiers (National Conservatory of Arts and Crafts) and Director of the SCOR Foundation for Science.
He is a member of the Boards of Directors of the SCOR Foundation for Science, the Toulouse School of Economics and Humensis and of the Scientific Committee of the French Prudential Control and Regulatory Authority and of the Scientific Council of the Maurice Allais Foundation.
He is President of the Risk Commission of APREF and member of the editorial boards of the Revue Française d’Économie, the magazines «Commentaire, Risques et Sociétal», and the «Revue d’Économie Financière».
**Philippe MAUPAS**
Co-founder of Alpha & K and Blogger
Matteo RAVA
Matteo contributes to ESMA’s work on the business conduct aspects relating to the provision of investment services and activities by investment firms and credit institutions in the retail financial services markets, and on investor protection more generally.
Jean-Philippe BARJON
Head of Coordination for Sales Management Supervision, ACPR, Autorité de Contrôle Prudentiel et de Résolution
Sandrine LEMRY
Sandrine Lemery is a CNAM professor holding the Chair of Actuarial Science and Vice-President of the Institute of Actuaries. She is also the non-executive President of the Supervisory Board of the Pension Reserve Fund.
NEW INFRASTRUCTURES TO BETTER SERVE CLIENTS
Throughout its one year of existence, the FairR program has had the opportunity to gather a unique set of round tables, featuring some of the world’s best researchers. Here is a list of the round tables that are relevant to this chapter:
- Insurance, 05/09/2019, Conservatoire National des Arts et Métiers, Paris, organized by Toulouse School of Economics
- Robo-advisor, 16/01/2020, ACPR, PARIS, Organized by Fair
- Resolution of post-trades via a distributed ledger, 20/05/2019, ACPR, PARIS, organized by Fair
New technologies and infrastructure are putting a lot of pressure on traditional actors from the financial system. However, different sectors react differently to such competition. While the insurance sector follows mostly a slow-paced process of innovation, banks have had to find ways to stimulate innovation. Here follows a discussion on both of these topics. The first one is from the Insurance round table where Pierre-Alain de Malleray and Aimé Lachapelle discuss about how new technology has impacted the insurance business. The second one is from the tokenisation round table in which David Durochoux explains how Société General has been trying to stimulate internal innovation.
ROUND TABLE: EXCERPT 1
NEW CHALLENGES IN INSURANCE
05/09/2019,
CONSERVATOIRE NATIONAL DES ARTS ET MÉTIERS, PARIS,
ORGANIZED BY TOULOUSE SCHOOL OF ECONOMICS
Pierre-Alain DE MALLERAY
“Hello everyone, my name is Pierre Alain de Malleray. I am the current CEO of a brokerage company. I speak here on behalf of the distribution point of view. Prior to that, I worked in the public sector, similarly to Sandrine, and then I actually worked a few years in reinsurance with Philippe. So, perhaps let’s start with a short answer to the very vast and important question: has insurance been disrupted? I think that this is a no-brainer, I believe the answer is definitely no. Yet, when we look a little bit more closely at what disruption could be like in our sector, we can zoom in on different aspects of the value chain, distribution and tariffs segmentation. There is a craze on a very hype subject as to other big data, as well as statistical learning, deep learning, and data in general that people leave on the internet with their smartphones etc. The question is: will insurances be able to approach the risk more closely than today?
Distribution, tariff, segmentation and user experience is another means to disrupt an economic sector. There are a lot of sectors around that are disrupted by user experience and more vastly by the product itself. Can the product be really different than what it is today, apart from the pricing? My answer to all these sub-questions is the following: when we look at the distribution issue, we have to answer differently according to the country, e.g. France or the United Kingdom. The US is a bit different. But let’s take these two examples which have taken really different paths. When you look at what is the weight of the distribution over the internet, and here
I am talking about insurance for individuals, I am not talking about insurance for companies. But the first policy was sold in the UK in the year 2000 over the internet, and when I say over the internet, it is a mix generally between either 100% internet or internet+telephone. I globalised those two means of distribution channels under the same umbrella. The first policy was sold in the year 2000 and by the end of the 2010 decade, 70% of motor insurance policies were sold over the internet. So there was really a huge massive disruption of the market regarding distribution. The UK market is very much brokerage driven. Insurance policies are generally fixed term ones, so individuals must comparatively yearly review on the internet to make quotes, etc. Furthermore, aggregators have played a crucial role in this evolution because they were literally nonexistent during the 2000s decade. They have progressively invested a lot in branding, press commercials, movie commercials, on television, etc. In the middle of the decade, around 2005, the investment of aggregators in commercials were higher than the investments of incumbent insurance companies. They waged a war and they won that war regarding direct access to consumers. So this market has literally shifted. When we look back at our country, i.e. France, there has been very slow disruption, so I don’t think the word disruption is the right one. It is more like a slow evolution, regarding the market share of each distribution channel. It’s around 70% in the UK. What is the figure in France? Well it is more or less 10-12%. So 70% corresponds to 10-12% in France. When you look at other industrialized countries it is more or less around 15%. This is not really a surprise, because when you look at the other economic sectors, such as retail, other goods’ distribution, or the market share of direct internet channels, it’s more or less around 15%. For your information, when I say internet, it is either on a smartphone or the desktop, or a mix between these channels. So, market shares of these means of distribution, like new direct internet, is around the same as other economic sectors. Yet, because the insurance product is highly dematerialized, e.g. you don’t need to go to a store to buy it, we could assume that the internet distribution growth is going to grow at quite a high pace. The actual growth rate of these channels in France is more or less 10-15% a year, so the number of people who go on the internet to buy insurance products has a growth rate of roughly 10-15%. That is what I wanted to say regarding distribution. Let me briefly explain what we do here at Santiane. Santiane is a broker on the French health insurance market. We exclusively sell Santiane over the internet with a mix of internet and telephone. We are now the number one e-broker. I think one interesting thing to know is that you don’t buy insurance on the internet like other products. Insurance products are complexe. They usually can scare people away, especially when you talk about issues such as health, you want to know exactly what you are buying.
You could go to a hospital where you need to have medical care from a specialist doctor, etc. You need to understand the terms. You need to compare one contract to another. Consequently, you don’t just buy it just with a simple click on your smartphone. The consumer, and French consumers, need to be coached by an advisor. If this advisor is independent from the insurance company, then it works best because they inspire trust. And here at Santiane, we have a team of advisors who coach new clients. They stay on the phone for a long time, for an average of 1 hour and 15 minutes per call. So it is not the call center you can imagine with short conversations, etc. It is really an intensive pedagogical kind of call. As far as the other topics are concerned, perhaps we can address them later on, with products such as big data, etc.”
Aimé LACHAPELLE
I have been working for around 5 to 6 years in the insurance sector, mainly in pricing with Axa global direct, direct insurance in France. Since then, I have been working in the consulting business, where I basically spend half of my time on AI and data transformation topics in the insurance and banking industry and the other half on the same topic but for other industries.
So, I’m going to tackle this question very quickly here. I have seen very profoundly what has happened within Axa, and also for slightly more than 10 clients in the last 3 years, in 10 insurance companies. Therefore, what I have observed is that insurance is an information and technology business by essence. It is a fair tight ground but then the segment is the same, i.e. it is shared, there is no disruption that was announced or expected. Perhaps it’s because it was wrong to announce or expect it. Finally, it is continuously evolving, like in many other industries. For instance, there is a similar situation in other sectors, such as the banking industry, the automotive industry, etc. People are doing things, step by step, with all of the usual barriers, i.e. how to industrialize a new technology that is used to doing AI and data. It is not the same technology. We need to go for the clud. Clud for insurance is not an easy question because there are a lot of personal data. Yet something is happening. As Microsoft announced, there was a big deal in Switzerland involving UBS and Swissfree. These are huge moves of these companies for the clud that will facilitate the transformation. Then there is a clear opportunity at all levels of the industry. At the core business level, even if it is tricky, for instance for claims: how to simplify and make more cost effective claims processes? There is obviously pricing augmentation, and then we go for a new paradigm with more incentive schemes with telematics, for instance. There are also all things customer experience-related. So, I heard Pierre Alain that you mentioned that the byclick is not the right thing, but maybe there is a claimclick that could be done. You are in a car, you just push the claim button and everything is done and settled by your risk partner who is your insurer. So the opportunity is clear, i.e. more disruption, no revolution. Regarding strong barriers, we already mentioned some of them. So for new entrants they need reserves to come, it is a very complex product, so many things need to be managed. You have all the risk management aspects. You have technological barriers but still some changes, which we will come back to later. I would also like to jump in on what Pierre Alain said on the UK market, that there was a clear disruption on the brokering side. I think that the figures are even higher now. The latest figures are more than 90%, with motor figures that are bought through aggregators, i.e. internet aggregators. You mentioned several factors that allowed for this disruption, so I think there is probably also a more open regulation in the UK that encouraged this type of evolution. Something happened 3 or 4 years ago. There was a very sophisticated insurer with Admiral Group who announced that they would use Facebook information data in their pricing, and the regulator didn’t block this, Facebook did. So I think this tells us a lot about what is going on in this country.
Philippe TRAINAR
Yes, thank you very much. In fact let me come back to the background. What is digitalisation and what is digitalisation in insurance? When looking at digitalisation, it is economically interesting because it reduces costs, and in turn reduces costs through former channels, the first one being big data. We know that data is all of the current economy and it reduces the cost of tracking and searching data. The second dimension is the internet of things. What is the novelty of the internet of things? It can provide a data cluster, i.e. reducing largely the cost of surge in tracking again. You have a bijection between the different data in the cluster. It is accepted not to do any statistical analysis to infer bijection. Then you have the third pillar that is robotics and artificial intelligence, which replicates young behavior and which in other words causes verification, replication, etc. It is very dangerous for the most skilled labels in our economies. Finally, you have the last pillar, which is very interesting because it is there when disruption happens in different economies. It is a kind of comeback of the economy which brings them closer and closer to supply on an industrial level. It has been seen in the disruption of different arising sectors, yet we did not see it in insurance in France. The reason is because distribution in France is largely integrated to the agency system that is dependent from one company to another and integrated in the insurance banking system. In some health insurance companies, employees directly sell products. In France, brokers have no place or no important place
in the retail market, except the dynamic actor which is probably the future of the market with Pierre-Alain. Consequently, we have not seen any revolution within the retail distribution in France for it is very difficult for it to happen. We have to indeed change everything before a revolution can happen.
May I just complete this very quickly. I think effectively that the digital revolution is some kind of silent revolution. What we see is that insurance companies are using more and more big data and the internet of things, as well as robotics. They are beginning to use artificial intelligence, and I don’t know what Aimé would say about that. But it is more progressive. It is really progressive because at the same time, insurers are cautious, as there are a lot of liability problems when using, for instance, artificial intelligence or internet of things and therefore they just progressively advance, step by step, in order to be sure they are on secure ground.
ROUND TABLE: EXCERPT 2
RESOLUTION OF POST-TRADES VIA A DISTRIBUTED LEDGER
ROUND TABLE « ADDING VALUE TO FINANCIAL MARKETS WITH THE BLOCKCHAIN »:
PROMOTE BREAKTHROUGH INNOVATION BY DAVID DUROUCHOUX
20/05/2019,
ACPM, PARIS
ORGANIZED BY FaIR
David Duroouchoux
There’s a press release dated from mid April, regarding a Security Token, for which we worked in partnership with PwC. We are very happy with this participation and we had a lot of feedback from them. Thank you very much Sébastien. The initial idea originated when the bank’s General Management decided to launch a call for projects to all employees, looking for disruptive business. Everything was eligible.
It was a pretty nice mix of formalwear and casual wear. The goal was to bring out and directly sponsor by executive committee members ideas that would drive the bank’s businesses in the upcoming years. We have a very high regulatory influence and offer solutions with a very high technical debt, at a time when global competition is heightened. It is the consequence of the business strategic projections in decline. The idea behind this initiative at Société Générale was to see how, through new technologies, particularly the Blockchain and artificial intelligence, it would be feasible to develop innovative solutions.
It was also an opportunity to give people the chance to step out of their usual teams’ box, to give them a budget, and to see what they could come up with in terms of «start-up mode». These volunteers received support and coaching from bank’s managers, who consequently were also confronted with their own business choices. The idea was to see if they too were capable of going beyond their habits and to push them towards breakthrough innovations.
Approximately 1,000 projects have been submitted with 60 to 70 funded. And we’re one of about 20 or so that have come through, with two start-ups that have merged. Our project was based on the observation that the technical Proof of Concept on the Blockchain part era was outdated. So the question was how to move into commercial production, in order to bring out real business issues. It was therefore a question of understanding how to provide the bank with a commercial offer based on digital assets. Our aim is above all to understand how to continue to sell products in such a context. Whether the technology is R3, Ethereum, H-Graph, etc., it doesn’t matter, since, as Jean Safar pointed out earlier, technologies are in fact evolving very rapidly. Our goal was to understand how concretely speaking our traditional origination processes could benefit from these new technologies.
Since it’s complicated, when you’re not a bank, to be a Fintech that truly operates in a regulated market, we chose to position ourselves within Société Générale. This way we could understand, from the inside, the regulatory complexity that digital assets’ marketing could face. Today, our areas of work are based on a regulation context and on the understanding of the adapted commercial positioning.
Our objective is to provide our customers with new offers, based on Blockchain of course, and to see how smart contracts can help us improve. For instance, there is obviously transparency provided to the customer. An Automated Transfer Agent would risk disintermediating us ourselves. But we need to tackle this issue head on. We could theoretically talk about the Blockchain for hours on end. Some people do it very well. The problem is the organization. You have to get something out in production, that’s what’s very challenging. That’s why we wanted to take advantage of start-ups to release a viable product with just a small but meaningful number of features.
With respect to the mid-April bond issue, as described by Sébastien, it is Société Générale, a refinancing subsidiary that issues a $100 million bond amount, and Société Générale parent company that buys back these bonds.
It is nevertheless a real test that we practice widely. Innovation in relation to what we have seen elsewhere is firstly on a Public Blockchain. We’re not on R3, Ripple, etc., or the Settlement Blockchain. Secondly, the token carries the legal privilege, i.e., the holder of the token obviously owns the rights to the bond.
With respect to the mid-April bond issue, as described by Sébastien, it is Société Générale, a refinancing subsidiary that issues a $100 million bond amount, and Société Générale parent company that buys back these bonds.
It is nevertheless a real test that we practice widely. Innovation in relation to what we have seen elsewhere is firstly on a Public Blockchain. We’re not on R3, Ripple, etc., or the Settlement Blockchain. Secondly, the token carries the legal privilege, i.e., the holder of the token obviously owns the rights to the bond.
NEW CHALLENGES FOR RISK MANAGEMENT AND REGULATORS
Although the focus is usually made on financial actors, new technologies are also a great challenge for regulators. The main concern is that the regulatory framework should put strong barriers in order to protect the consumer while giving the ability to financial institutions to keep innovating. This question is particularly important for the robo-advisor business. Indeed, since the goal is to advise consumers on their investment, the regulator really wants to make sure the robot acts in the best interest of the client. On the insurance side, it is more a question of privacy. In this case, the regulator wants to prevent misuse of personal information in the move to segmentation.
Here follows two excerpts of FaIR round tables. Each addressing the regulatory challenges regarding robo-advisors, STO and insurance respectively. The first one is from the Robo-advisor round table. The second one is from the Insurance round table in which Philippe, Aimé Lachapelle and Sandrine Lemry talk about segmentation and the corresponding regulatory issues.
ROUND TABLE: EXCERPT 3
ROBO-ADVISORS
16/01/2020,
ACPR, PARIS,
ORGANIZED BY FaIR
Mark SINSHEIMER
I’ll speak as a regulator, but I’m really curious as to what other panelists have to say. We looked at this quite carefully. And teaming for best protection, we really put ourselves on the client side, rather than on the firm side. So, how we approached it was to regulate at least in Europe, and I’m thinking specifically of MiFID for the security sector. It sets a series of controls and elements that have to be executed by an intermediary when it performs certain investment services such as investment advice or portfolio management. What we didn’t want to do was lower some of these controls or simplify them based on the technology you are using because that is not relevant for the client, contrary to the nature of the service they are receiving. Therefore, for us, the issue is not really to set different rules or requirements according to whether you are providing human advice, or robo advice, because as previously mentioned this can change tomorrow. It’s not even robo-advice, it’s an app, or something else. It can be done over the phone, you can have a million models. What we find challenging as regulators and what we are trying to do is instead, is to guide robo-advisors and explain how to apply current regulation. We acknowledge that this regulation has been, willingly or not, drafted with the traditional banking model in mind. So, sometimes it can be challenging for the robo-advisor because they don’t think that way, they’re not structured as a typical bank. To sum up, once again, from a regulatory perspective, the issue is not really about setting different rules but about working together, with the industry, to provide guidance and help them, and make the regulatory aspect not an surmountable barrier but help them comply with existing requirements.
In the United States there is this issue regarding fiduciary responsibility, especially when it relates to DC pension funds, etc. For instance, regulators have roughly taken your approach but the department of Labor has been a little bit embarrassed because it’s hard to trust a robot. So, here is where we define whether it’s pure play, or not. If you trust an individual, who knows how to use a robot, then it’s business as usual. Yet, if it’s something that is purely algo-driven or it pretends to be so, then it could be business as usual, but some people can feel uncomfortable about it all.
Matteo RAVA
In Europe, at least we are one step ahead on that topic, because there is a clear obligation for intermediaries to act in the best interest of the client. This is not the case in the US. And not for all services, and that is why they tried to fight. Industry is resisting. I think the advantage in the US is probably that the level of financial knowledge, i.e. the average financial understanding of clients is much higher than the average retail client. I come from Italy and let me give you the following example. My mother has a degree in Nuclear Physics, so quantum physics comes easily to her but if you asked her the difference between a bond and a share, she wouldn’t know what to answer. So, again, compared to the US, it’s quite striking I would say.
Philippe MAUPAS
I don’t really agree with your reference to the US. They have a fiduciary standard which doesn’t exist here, and registered financial advisors who are rarely subject to this standard. Broker dealers aren’t held to suitability standards which, unless I am very wrong, is the standard that prevails in Europe. Even we have the expression «intermediaries have to work in the best interest of the client», provided they provide suitable advice.
Matteo RAVA
Yes, but the best interest is legally a step before and you have to, of course, provide in Europe suitable advice which means matching the investment objective. Yet, there is always the higher presumption that, however you apply those details and requirements, there is always the best interest for the client, which, to me, is always broader in Europe in terms of legal requirements than in the US, in terms of actors to whom it applies to.
Mark SINSHEIMER
Do you see a problem regarding authorization and monitoring robo-advisors? How is inspection done for instance?
Matteo RAVA
My short answer is that the phenomenon in Europe is still very small in terms of numbers. The reality is that, for them, it still has very little impact in the overall supervisor activity, and they tend to supervise more by services, again, rather than by specific business models.
Jean-Philippe BARJON
Yes, I can confirm what Mateo said. Clearly, the general stance of supervisors is to be technologically neutral. I mean our mandate is to monitor and to supervise implementation of the rules regarding consumer protection. So, we are focused on this subject. The question of whether a kind of player will flourish in the next decade is not exactly our subject.
Indeed, this is not an issue for us, as long as these players, will comply with the rules regarding consumer protection.
**Mark SINSHIMER**
The main issue is supervision fraud, negligence, etc. if it’s human, it’s like «business as usual», but if it’s purely algo robo, I mean, honestly, you’ve got to evaluate the model risks. So what is the supervision model, how it is tested and monitored? How is it researched? You need to look at data risk, contingency risk, continuity risk, coding risk, etc. The best risk manager in the world, possibly Barr Rosenberg, who received numerous medals for his achievements, was banned from markets, because of a coding error in his firm. So, small errors, big consequences.
**Jean-Philippe Barjon**
Yes, I agree with you. But this is the discussion, automation creates a kind of systematic risk. I agree with you, it’s obvious. On the other end, it is clear as well that it is more easily auditable.
Therefore why isn’t it a question of big data? For instance if you are using google for health issues, I don’t know if you are looking at data for yourself, for your wife, for your kids, for your grandmother, your grandfather etc. Therefore, if I offer you, and not, say, your grandfather, the wrong price, you will refuse, the deal will be off and I will have lost a client. Consequently, because there is no bijection between most of the data, I will be able to gather some data and your risk profile, and most of the time I will not be able to use it correctly. However, it is very costly to gather big data. Even if we have seen the reduction in gathering data in France, it remains very costly. Therefore, I have no incentive in terms of profitability if I am not sure of the bijection between data and your risk profile. Hence, I think that the segmentation question is not well understood, especially as politicians are confusing the question of redistribution and insurance. Therefore, at this point in time we are not correctly dealing with the question of segmentation. We should believe in separating the efficiency of the insurance market and the question of the efficiency of redistribution that is the consistency of redistribution with political targets and deals in different ways.
**Aimé LACHAPELLE**
Ok, thank you. I would like to react to what you just said Philippe. I think it depends on, first the paradigm, what are we insuring and what are the risks? I think that this is completely true when you talk about short term risks, i.e. you are the best at knowing your risks. For example, you know if you drink or not. My perspective on the yearly contract insurance is that I know less about my risk than what the machine learning model will say about my risk. Because it is just impossible for my mind to aggregate all the behavior I will have during a year when I am driving my car. Therefore, I am unsure if we stay with the scheme where we have a yearly contract. Insurers can disappear because we don’t know our own risk as well as complexe algorithm processing, even with imperfect data. The second point is segmentation - and you say this is a question of efficiency, and I fully agree – because now this is a market scheme, so players are following these rules. Hence, segmentation also remains because all players are going along with it. There is probably a limit point. Today the capitalistic short term view is that the limit point is slightly better than others. The long term view could be different. As I mentioned earlier, with IoT and telematics, and scores that are impacting prices, you can downsize prices. The grading scores are better, you have incentives, and you will reduce the overall claim level. So, you forget about segmentation when you are doing this. Therefore, my point is that this limit point depends on the point of view.
**Philippe TRAINAR**
May I just react very quickly. My point is that, if you don’t know your risk, and if I can’t know your risk, I have no incentive to know it. Why? Because I will spend money trying to know when I could simply effortlessly apply the mean tariff. You will accept it because you don’t know your risk. And Pierre Alain will also accept it because he does not know your risk. The only problem is if a significant fraction of my clients know their risk very well, then I have to segment in order to be sure that I am efficient. Sandrine?
**Sandrine LEMRY**
And if I may add, there are already segmentations which are very known, for instance in men and women. But they have been forbidden by European regulation, so you are not allowed
to discriminate on death or lifespan for men and women. So actually segmentation has not always been used and sometimes the regulation wants indeed to prevent this because the social contract is important. What you were saying, Philippe, on redistribution vs. mutualisation is not so obvious. So there has already been a lot of very well known segmentation. A case against segmentation, that has already been partly addressed here, is whether its cost is worth it. At one point it wasn’t. For instance, the insurance stereotype is that actuaries set the tariff. They say, for instance, well it is 100, and then the sales rep wants to sell the product, and they say “ok, but I can sell it 70”, and then the real price of the product is not worth as much compared to what you can sell it for. So lots of effort has been put into selling more, and then deciding the right cost of the product. The other thing I’ve seen on segmentation is that all insurers, when you look at their business plans, have twice the market. It is because everyone makes huge projections using the same strategy, i.e. I have clients on this line of product, and my new strategy is to equip my client with all kinds of insurance. That is what we have seen for instance with bank insurers that are now coming from health into retail insurance, etc. So the strategy of an insurer is somehow segmentation, but it is also having the entire risk in order to deliver a good service and also to compensate the cost of risks between one branch and another. Therefore, what I would say is that currently segmentation can be worth only as a niche which is not what we have observed. On the contrary, I would say what we previously stated, i.e. that insurance is a national market. The European commission has tried time and again to make it a European market, but insurance is really dependent on taxes for savings. It is dependent on lots of issues, for health, etc. For instance, I would take the example of construction. In construction, it is exactly the opposite that has happened. In France, we have a construction market where insurers sell construction contracts to companies. Construction companies that carry a bad risk, ask them for a tariff that is very high or they refuse. Then we have foreign insurers, who came from Gibraltar and lots of other places, who started selling at the same price, or a bit less, than the other companies with huge commissions that were not obvious to the clients and we sort of had a segmentation at the opposite ends: bad risk going to companies in free service provision. These companies that were not supervisors, if they were in France, would go completely bust, and now we have a huge problem with this issue.
It is an interesting topic, because we seem to say in France that nothing is going on, but is it dependent on the French market. Actually, we could already have some European actors coming from abroad and selling with all these capacities. What Pierre Alain was saying about how GAFAs are not ready to enter the insurance market, is that they really understand the product and insurance products are not really standardizable. We speak a lot about determining the right price, but the thing is, how to design the right product for the client? This is at the time being not only a question of data. It is more complicated than that, and perhaps it will change. There are huge possibilities for change, but nothing is shifting yet.
The main goal of the financial system is to transfer risks in the economy. With recent technological innovations, financial actors and the financial system as a whole may find ways to better assess and move risks around in the economy. On the one hand, an increased digitalisation of financial products mainly due to recent developments in computer science and distributed ledger technologies creates new kinds of interactions between financial agents. With this, comes new regulatory possibilities and concerns. On the other hand, the recent boom in artificial intelligence offers new potential tools for financial actors to better extract structure in data that has the potential to allow a greater level of automation and understanding of risks.
Along those transformations may very well come an even more important change. Improved risk intermediation may also be accompanied with disintermediation. As competition increases, (from new financial actors, from GAFAM, as well as from alternative global borderless infrastructures), current financial actors may be at the risk of being disintermediate. With the correct technological design, the system as a whole could be more efficient at transferring risk with less intermediaries. This has the potential to fundamentally alter the value chain of risks.
Distributed ledger technologies (DLT) are only at their infancy, but they represent an important regulatory perspective. Most regulators around the globe are currently actively looking at the potential use cases of DLT. The main promise is a more efficient financial system, especially regarding the reduction of transaction costs that would be achieved with increased interoperability of existing systems. A regulator willing to implement such a system would have two options: 1) adding an interoperability layer that would connect to existing systems and make seamless transfers from one system to the others, and 2) creating a new global system that would be interoperable by design. The latter would most likely come with some degree of disintermediation. Current intermediaries may not have sufficient incentives to innovate in this direction (because they are intermediaries), so the regulators would have to tackle this question in the near future.
However, there are also new players (GAFAM) that are moving more and more toward financial applications (see examples in China : AliPay and Weechat - payment service providers). As they have been very effective at building global interoperable systems in the field of information transfer and communication, there is the possibility they will also be very effective at building a global financial infrastructure. With those tech companies but also smaller one, referred to as fintech, the traditional financial sector is under heavy competition on each of its functions independently. This unbundling of functions is very characteristic of the current context. Regulators will likely have to take decisions in this challenging context.
Alongside developments in infrastructure, the growing use of artificial intelligence in the financial sector can also have an important impact on risk intermediation. As more and more data are being collected (by both financial and non-financial actors) more complex models can be used to have supposedly better representation of the economy. The recent developments in generative deep learning models may even be used to leverage the amount of data collected. Indeed, generative models will soon be able to have a very good representation of the underlying distributions of real data so that they could be used to generate several other alternative histories of data that could then be fed to other deep learning models.
With a large amount of data, two of the main applications are Data-driven trading decisions and Deep hedging. While data analysis, and in particular machine learning, have been used to extract useful information from large amounts of data, being able to create actionable insights that can be used to automate trading decisions or hedging strategies is crucial for a lot of financial actors. Automation in decision making is not new of course, but big data and machine learning enables algorithms to exploit much more complex patterns.
Like almost any technological breakthrough, artificial intelligence induces a conceptual revolution. In many sectors, including financial applications, research in this area has been quite dense in the last decade. We are to a point at which new types of jobs are created in the financial sector that require new skills and therefore new education programs. The next decade will likely settle on the direction this field will take and the true useful applications enabled by this technological revolution.
In the remaining of this chapter, there are a total of five short papers, including three from the International Scientific Committee (ISC) and two from members of one of FaIR’s research programs, as well as an extended abstract of a research paper and a condensate of relevant excerpts from FaIR’s round tables. First for the ISC, Darrell Duffie (Stanford) shares his view on the interoperability of international payment systems notably through the use of a Central Bank Digital Currency. Second, Alexander Lipton (MIT) explains how DLT as technological innovations can potentially help modernise the current financial ecosystem as a whole. Third, Cris Doloc (University of Chicago) explores the impact of machine learning techniques improving to the point where it is possible to generate actionable insights for automated models in trading. This chapter then features two papers from the FaIR research community. First Lukasz Spruch (Alan Turing Institute) gives a technical overview of the recent developments in model based machine learning in finance. Lastly, Blanka Horvath presents her view on the transformative role of new technologies on market models, especially on market generators. In an extended abstract, Michel Crouhy, Dan Galaia and Zvi Wiener explore through a functional approach what is the fintech’s impact on financial intermediation. In the last part of this chapter, some excerpts from FaIR’s round tables are presented in the context of artificial intelligence and risk intermediation.
2. THE MEANING OF INTEROPERABILITY
To get at the meaning of interoperability, we can think of a payment system as a collection of multi-account ledgers. Each ledger is capable of instant transfers between any two accounts on that ledger. Two different ledgers are interoperable if there is always at least one intermediary holding accounts on each of the two ledgers that automatically meets legal requests to transfer funds from any account on one of the ledgers to any account on the other. For example, a request to transfer from an account on ledger A to an account on ledger B is met by a transfer from the source account on A to an intermediary’s account on A, and an equal transfer from the intermediary’s account on B to the destination account on B. For interoperability to be effective, transfers should be done at negligible latency and user cost. The definition of interoperability is extended by calling two different ledgers interoperable if they are elements of a network of interoperable ledgers (A network is a connected graph. In our setting, the links of the graph are defined by pair-wise interoperability).
A conventional two-tiered bank-based payment-system, as depicted in Figure 1, offers a degree of interoperability. The inner tier consists of a central bank (CB) and banks holding accounts at the central bank. In the inner tier, banks make most of their payments to each other by transferring deposits held in their accounts at the central bank. The outer tier consists of the banks and their customers, who can direct payments from their own bank accounts to accounts at other banks. The account ledgers of two different banks are thus interoperable via an inner tier settlement system, such as Fedwire in the U.S. or the Eurozone’s Target2.
In practice, however, the degree of interoperability is reduced, often significantly, by user costs and fees of various types, significant latencies (often more than a day), and limited time-of-day access. Some payment system authorities, including those of the United Kingdom and the Eurozone, have reacted by introducing “fast payment systems” that offer almost instant transactions, around the clock, with low user costs. Still, however, fast payments are not dominant in the U.K. and the Eurozone, and are in a much earlier stage of development in the United States.
A CBDC that is based on central bank deposit accounts for every user has only one ledger. With a broadly used CBDC, interoperability is therefore not an issue, given the relative ease of arranging for low-cost instant transfers across the entire economy.
Alternatively, a high degree of interoperability can be achieved by upgrading a conventional two-tiered bank-account-based payment system, of the sort depicted in Figure 1, by introducing a single common account ledger for the customer accounts of all banks in the system. This single outer-tier ledger is interoperable with a single inner-tier ledger, containing the accounts of all banks at the central bank. With this two-ledger approach, each bank is responsible for meeting its own deposit liabilities and is able to observe only the account information of its own customers. Although this two-ledger approach has yet to be adopted, it is already technically feasible and seems to satisfy the criteria of central banks that wish to improve the efficiency of their payment systems without introducing a general-purpose CBDC.
3. INTEROPERABILITY WITH CBDC
Until now, most central banks have shied away from providing CBDC directly to everyone in the economy. But there have been serious prototypes and proposals for “hybrid” or “synthetic” CBDC, by which private-sector actors would be responsible for payment services associated with one or more digital currencies backed by the central bank. Of the proposed variants of this model, two are prominent:
1. The central bank issues CBDC “tokens” to one or more payment service providers who redistribute the tokens to a broad set of customers, along with payment apps and other infrastructure. The CBDC tokens are analogous to paper currency, as direct claims on the central bank, but are transferred electronically. Token holdings are recorded in ledger accounts maintained by the central bank or by payment service providers. The payment service providers could be commercial banks or fintech firms. Interoperability requires that all actors in the economy are able to seemlessly transfer the CBDC to each other, implying a common payment technology or strong standardization. The Peoples Bank of China has begun to test a related form of CBDC called DC/EP (digital currency/electronic payment). The Bank of England has published its principles for a similar approach to CBDC.
2. As an alternative, which Adrian and Mancini-Griffoli (2019) call “synthetic CBDC,” payment service providers can be permitted to back their own private-sector digital currencies 100% with deposit accounts at the central bank. In effect, each of the resulting private sector digital currency is in the form of narrow payment-bank deposits (I am a member of the board of directors of a proposed narrow bank, TNB Inc., which is not a payments narrow bank.). In this case, interoperability requires not only interoperable payment technologies, but also perfect fungibility of the various resulting private digital currencies. This raises various additional technical challenges that deserve a lengthier discussion.
4. FINAL REMARKS
I believe that fast highly interoperable payment technologies of some form will dominate some major economies within the next decade or so. These new technologies can be based on next generation bank-account-based payment systems, central bank digital currencies, or some hybrid or synthetic form of CBDC.
Most developed-market central banks continue to show a preference for increasing the efficiency of bank-account-based payment systems over the deployment of CBDCs, but have also become more open to discussing the potential benefits of the introduction of a CBDC.
STABLE COINS AND THEIR ROLE IN TRANSFORMING THE FINANCIAL ECOSYSTEM
Alexander LIPTON,
Co-Founder and Chief Information Officer at Sila, Partner at Numeraire Financial, Visiting Professor and Dean’s Fellow at the Hebrew University of Jerusalem, and Connection Science Fellow at MIT
1. INTRODUCTION
It became painfully obvious during and after the Global Financial Crisis (GFC) that the existing banking and payment systems, are unstable, obsolete and no longer aligned with the constantly changing requirements of the real economy. Unfortunately, the GFC turned into a wasted opportunity to reorganize the world financial ecosystem. Too-big-to-fail banks dramatically increased (rather than decreased!) in size by amplifying their share of the banking business at the expense of their failed competitors, while the number of banks has shrunk. Superficially, banks are better capitalized, but their complexity increased to such a degree that their true financial positions cannot be ascertained with neither by regulators nor by depositors, investors, and, somewhat alarmingly, by their own management. Balance sheets of large banks which were opaque before the GFC became even more so and have added risks of unquantifiable complexity. As a result, many banks and other financial institutions have become too-big-to-manage. In addition, clearing and settlement of many over-the-counter derivatives was mandatory moved to central clearing counterparties (CCPs), making CCPs potential points of failure for the system as a whole. A high level of interconnectedness of CCPs due to the fact that they have many common general clearing members adds an extra degree of instability.
Not surprisingly, the general public is frustrated with the status quo. This frustration manifests itself in various aspects of economic and social life and almost universal aversion to banks and banking. Thankfully, companies harnessing new technologies, including blockchains and distributed ledgers, can put much needed competitive pressures on the incumbents, help newly formed fintech companies to enter the market, and provide considerable benefits to the general public. Assuming that regulators encourage competition and properly adapt regulation, we expect to see contests between fractional reserve and narrow banks; physical and digital cash; fiat currencies and asset-backed cryptocurrencies; and, most importantly, centralized and distributed payment systems. The outcome of these contests will reshape the entire financial ecosystem going forward, and, in a few years, might change it beyond recognition. If properly executed and regulated, a financial system of the future will be much better at payments, products issuance and personalization of financial services, and much closer connected to the real economy. In addition, it will become significantly less risky.
2. THE BANKING SYSTEM
2.1. Overview
While Internet Protocols (TCP/IP) have been responsible for the phenomenal proliferation of the Internet, which inspired and promoted completely new business models in numerous fields, such as digital commerce, social media, communications, etc., banking lags way behind. One of the biggest impediments in unleashing creativity and developing new business models in banking and finance, rather than mending existing legacy businesses, is the absence of successful TCP/IP for money and identity. In particular, in the 21st century, we still do not have a perfect electronic analogue of paper currency, which allows for an instantaneous and anonymous transfer of value without involvement of a middleman.
2.2. Credit Money Creation and Annihilation
In order to improve the system, we need to understand how it operates at present, and, first and foremost, the true nature of the process of money creation and annihilation. In our opinion the so-called modern monetary circuit theory, which claims that money is created by commercial banks when it is lent to their clients and destroyed by banks when it is repaid,
provides the most convincing explanation of the process, see [1], [6]. The corresponding interest comes from the next round of borrowing and stays in the system for good. In case when a borrower defaults, money is not repaid and destroyed as it should, and remains in the system forever, which is tantamount to forgery.
2.3. Bookkeeping and Transactions
As a result of the above process, the preponderance of money in circulation is just a sequence of transactions, organized in ledgers, which are maintained by various private banks, and by central banks providing means (central bank cash) and tools (various money transfer systems) for reconciling these ledgers. As part of ledger-maintaining and transactional functions for their clients, private banks play two very important roles, which central banks are not equipped to perform. They serve as the system gatekeepers, via know your customer (KYC) services, and system policemen, via anti-money laundering (AML) efforts. It is clear that, in addition to the better known areas of application of distributed ledger technology (DLT), for instance, in digital currencies (DCs), including central bank issued digital currencies (CBDCs), DLT can be used to solve such complex issues as trust and identity, thus helping to address the KYC and AML requirements. Moreover, since all banking activities boil down to maintaining a ledger, judicious applications of DLT can enable development of the distributed Financial Market Infrastructure (dFMI), with numerous promising applications in trading, clearing and settlement triad, payments, trade finance, and so on. However, if applied for its own sake, DLT can make the situation even less satisfactory than it already is.
2.4. Payments
The hallmark of the current financial system (if not its raison d'etre) is a long chain of middlemen engaged in moving money and securities between a buyer and a seller, not least in the form of correspondent banks. As usual, middlemen thrive in most situations, particularly when foreign exchange transactions are involved. The amount of various fees can easily reach 3% or more of the transactional amount, which is a very meaningful amount for most participants.
2.5. What is Wrong with the Current Setup?
The biggest problem with the existing banking system is that it is too complex for its own good, predominantly due to the fact that it commingles three distinct activities:
• creation and annihilation of credit money through lending;
• record keeping;
• execution of transactions.
Obviously, separating these activities is highly desirable in order to make banking less risky, nimble and more efficient. Setting lending aside, we emphasize that judicious usage of DLT can be very helpful in bringing record keeping and transaction execution into the 21st century.
3. DISTRIBUTED LEDGERS
3.1. General Considerations
IBM defines a distributed ledger as follows, [3]: “Blockchain is a shared, distributed ledger that facilitates the process of recording transactions and tracking assets in a business network. An asset can be tangible - a house, a car, cash, land - or intangible like intellectual property, such as patents, copyrights, or branding. Virtually anything of value can be tracked and traded on a blockchain network, reducing risk and cutting costs for all involved.”
While the idea of a BC is old, since BCs naturally occur whenever power, land, or property change hands, modern technology gives the old idea of BC a new lease of life [6]. DLT opens exciting opportunities for making conventional banking and trading activities less expensive and more efficient by removing frictions. Moreover, it has the potential for restructuring the whole financial system on new principles of dFMI. Obviously, achieving this goal requires overcoming not only technical but also epistemological and political obstacles.
In theory, payment systems using DLT can significantly reduce transaction costs to below 1% as they involve significantly fewer middlemen and have shorter paths for information flows. However, to build such systems in practice one needs to overcome several challenges, including regulation, scalability, privacy, and ease of use for all the relevant parties. Potentially DLT can have numerous applications outside of payments, for example, in clearance and settlement, trade finance, rehypothecation, syndicated loans, and other areas where frictions are particularly high. However, before applying DLT to all these areas, one needs to appreciate that some current systems are shaped by business and other considerations much more than by pure technological reasons.
3.2. Cryptocurrency Creation and Transactions
Cryptocurrencies took the world by storm. Bitcoin, proposed in a seminal paper published in 2008 by Satoshi Nakamoto, [10], was the first in a very long line of cryptocurrencies. Some of Bitcoin’s initial appeal was due to the fact that its creation was purely algorithmic in nature in sharp contrast to fiat. Shortly afterward, Ethereum, a second-generation, secure, decentralized computing system, was introduced by Buterin, [2]. Since 2008, several thousand of native cryptocurrencies operating on their own purpose-built ledgers, as well as tokens built on top of existing blockchain platforms, such as Ethereum, have been launched with varying degrees of success. Bitcoin, Ethereum and, to a lesser degree, Ripple all tried to play the role of money but ended up as a new speculative asset class. While technically very impressive, existing cryptos cannot be money in a traditional sense for at least three reasons:
• they are not stable enough, even for short transaction times, which prevents their usage for purposes of conventional commerce,
• they are operationally/inconvenient to use for an average economic agent, which is a prerequisite for their wide adoption,
• their built-in algorithmic monetary policies are too mechanical and inflexible to be practically useful.
Not surprisingly, the status quo in cryptocurrency land is not satisfactory and encourages further developments.
4. STABLE COINS AND THEIR TAXONOMY
4.1. Overview
One of the most exciting developments in this regard is the introduction of stable coins. The main advantage of a properly design stable coin is that it can serve as the cornerstone of a fully digital ecosystem facilitating fast and regulatory compliant payments on a commercial scale with minimal reliance on the existing banking, [11]. We feel that rather than designing monetary policy of its own, which is a challenging task in itself, innovators should initially aim at tokenizing existing stable financial instruments denominated in fiat currencies, such as US dollars. Later on, if these efforts prove to be successful, they should be able to tokenize more diverse asset pools, which can serve as a counterbalance to fiat currencies and will be very useful for cross-border transfers. Contrary to numerous claims, at present it is not possible to build a truly decentralized, stable coin. In fact, the mere estimation of the price on a crypto coin in terms of a fiat currency requires an oracle and automatically breaks decentralization. Ideally, it should be possible to directly observe this price from the distributed ledger. This is not quite possible for both conceptual and technical reasons. Hence, any potentially successful stable coin has to combine centralized and decentralized features.
4.2. Coins fully collateralized with fiat
Custodial coins that are fully collateralized with fiat are relatively centralized as their creation and annihilation is performed by a single party, which is also responsible for maintaining collateral.
However, once created, coins can freely move on the corresponding blockchain. Due to their semi-centralized design, custodial coins are particularly prone to regulatory influences and must be regulatory compliant in order to be able to survive. Several coins of this nature, such as Theter, TrueUSD, Sila, etc., either already exist or are currently being developed. It is easy to see that crypto exchanges, which are not fully integrated with the existing banking system, have to rely on stable coins in order to do business. However, building stable coins suitable for more broad commercial applications is a much more exciting goal.
All fully collateralized coins have inherent drawbacks, since, by construction, they are centralized, represent single points of failure, and an irresistible attraction for both regulators and hackers (for different reasons, of course). In many instances, particularly, in the case of Theter, there is no transparency regarding underlying reserves, which makes it difficult for users to trust these coins. Unless very carefully structured, fiat-backed coins have to rely on third parties, most notably banks, to keep the corresponding collateral and execute transactions on their behalf. As a result, they suffer from high costs of carry of the collateral. Inherent low profitability is a major danger in its own right, which cannot be overestimated. In order to overcome it, stable coins require a large scale to become profitable.
4.3. Coins Collateralized with Assets
When economic environment in a country is stable, it makes sense to collateralize crypto coins with the corresponding fiat. However, in some parts of the world it is not a viable option since the local fiat itself is not stable versus the USD and other major currencies. In such cases, coins collateralized with real assets can be developed, see, e.g., [8], [9] where the so-called digital trade coins (DTC) are introduced. These coins have significant utility value in stable environments as well, for example, for supply-chain financing and, such as oil trading or cross-border financing. In addition, asset-backed coins also useful by limiting the freedom of central banks to manipulate their currencies and serving as a much-needed counterbalance to the USD, in its role of the world reserve currency. The USD domination causes serious trade imbalances, triggers trade wars and exacerbates the international frictions. To alleviate these ills, several central banks have suggested that it makes sense to complement fiat currencies with a supranational currency. By combining the ideas of narrow banking (for stability), and asset-backed digital currencies (for efficiency and transparency), we can dramatically improve the global financial system. This is an exciting possibility of designing a digital supranational currency backed by a diverse and widely held assets, which could combine the best features of historical currencies, including finality of settlement, partial anonymity, and usability on the web.
It is obvious that, if so desired, a basket of fiat currencies can be used as a collateral for a DTC. This idea was recently popularized by the Libra Association, [4], without giving any credit to the similar ideas introduced in [8], [9].
4.4. KYC and AML Considerations
The role of KYC and AML requirements for regulatory compliance cannot be overestimated. KYC procedures have to be performed when new tokens are issued, or existing ones redeemed for fiat. Given that stable tokens are going to circulate on a public blockchain, which keep an immutable record of all transactions, AML can be performed indirectly by analyzing the corresponding transaction social graph. In general, stable token transactions are more transparent than conventional physical cash transactions and are more or less on a par with traditional banking transactions. It is rather telling that when Bitcoin and Ethereum just got introduced, criminal elements were extremely excited about their illicit usage. However, eventually they realized that immutable record of transactions opens new avenues for the law enforcement agencies to monitor and prosecute their activities. Hence, at present, they are leaning back to cash transactions.
4.5. Conclusions
Although the idea of distributed ledgers is not new, modern technology gives it a new lease of life. Potentially, distributed ledgers have numerous applications in finance. Cryptocurrencies are the best known but not the only ones. While conventional cryptocurrencies are interesting, they are not very useful for real economy. Digital cash holds a great promise and can change the whole financial ecosystem to the better. Asset-backed cryptocurrencies can serve as a much-needed counterpoint for fiat currencies, and a way forward toward ensuring world-wide financial stability and inclusion. It can also limit the impact of trade wars which disrupt existing supply chain.
5. REFERENCES
1. McLeay, M., Radia, A., and Thomas, R., 2014. Money Creation in the Modern Economy. Bank of England Quarterly Bulletin 2014 Q1. SSRN: https://ssrn.com/abstract=2416234.
2. Ethereum, 2018. A Next-Generation Smart Contract and Decentralized Application Platform. White Paper. https://ethereum.org/en/whitepaper/
3. Gupta, M., 2018. Blockchain for Dummies. 2nd IBM Limited Edition. John Wiley and Sons, Inc. http://gunkelweb.com/coms465/texts/ibm_blockchain.pdf
4. The Libra Association, 2019. An introduction to Libra. White Paper, pp. 1-12.
5. Lipton, A., 2016. Modern monetary circuit theory, stability of interconnected banking network, and balance sheet optimization for individual banks. International Journal of Theoretical and Applied Finance, 19(06), p.1650034.
6. Lipton, A., 2018. Blockchains and distributed ledgers in retrospective and perspective. The Journal of Risk Finance, 19(1), pp. 4-25.
7. Lipton, A., 2019. ‘Towards a Stable Tokenized Medium of Exchange’, in Brummer, C. (ed.) Cryptoassets. Legal, Regulatory and Monetary Perspectives. Oxford: OUP, pp. 89-116.
8. Lipton, A., Hardjono, T. and Pentland, A., 2018. Digital trade coin: towards a more stable digital currency. Royal Society Open Science, 5(7), p.180155.
9. Lipton, A. and Pentland, A., 2018. Breaking the bank. Scientific American, 318(1), pp. 26-31.
10. Nakamoto, S., 2008. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf
11. Sila, 2018. Sila: A Stable Fiat-Backed Digital Tokenized Means of Exchange. White Paper.
DATA DRIVEN DECISION MAKING IN TRADING AND INVESTING
Cris DOLOC,
Quantitative & Computational technologist
1. A NEW PARADIGM
We are currently witnessing the onset of a powerful tidal wave that could have a long-lasting impact on our civilization for generations to come. Jim Gray, one of the greatest computer scientists of the 20th century and recipient of the Turing award, has predicted the advent of this new era more than a decade ago. He has called it the “Data exploration” era [1], or a period where theory, experimentation and simulation will come together to solve some of the most important problems of our time. This paradigm is driven by the availability of extremely large amounts of data generated as a result of the latest technological innovations. This is the dawn of a new era where the process of decision-making is going to be driven by data and powered by algorithms.
The concept of data is central to this new paradigm. Data represents the modern vehicle used to encode the surrounding reality, while being an orthogonal dimension to the algorithm concept which is the complementary device used to decode the same reality. The impact of Big Data on the financial industry nowadays has the proportions of a tsunami. Solving problems of increasing complexity demands more high-quality data and better algorithms for processing.
The topic of Financial Machine Learning has attracted a lot of interest recently, specifically because it represents one of the most challenging problem spaces for the applicability of Machine Learning. The applicability of Machine Learning techniques has increased dramatically in the field of financial trading, especially because the need to speed-up and automate tasks that humans do not have the capacity to handle. Financial trading and investment rely on accurate inputs being fed into business decision-making models, which traditionally were handled by humans who made judgements based on these inputs. Nowadays this functionality is provided by informatics systems that can compute at a massive scale and extract Intelligence from a multitude of sources to reach better decisions practically instantaneously. However, one should emphasize that the utility of data can only be measured by our ability to extract actionable Intelligence from it. This transformation process is quite opaque, often misunderstood and very domain specific.
While the ability to extract actionable insights from data is central to scientific discovery and the innovation process in general, it is absolutely critical in the decision-making process in trading and investing. The last decade has seen the emergence of a new interdisciplinary field called Data Science that provides an extensive toolset that covers a large array of domains, from Mathematics and Statistics, to Computer Science as well as more specialized scientific methods. The extraction of actionable insights from data is a very complex transformation that involves distilling Data into meaningful Information, encoding it into Knowledge to eventually achieve the desired outcome – actionable Intelligence (see figure above).
2. THE CURRENT AI HYPE
John von Neumann, one of the most prolific polymaths of all times, said once: “If people do not believe that mathematics is simple, it is only because they do not realize how complicated life is”. Dealing with complexity is a hard-core requirement for the survival of biological entities, especially for humans. And dealing with complexity requires the use of properly defined terminology. The use of consistent and proper terminology is paramount to Science and Engineering, and it is especially essential when it comes to the use of novel technologies. As such it is important to define an adequate level of engineering and scientific clarity when it comes to using the term Artificial Intelligence, specifically as it relates to the financial industry.
The term AI has become the mantra of our time as this label is used more and more frequently as an intellectual wildcard by academicians and technologists alike. The AI label is particularly abused by media pundits, analysts and venture capitalists. The liberal use of terms like AI disruption or AI revolution is the manifestation of a systemic failure to understand the technical complexity of this topic. The zeitgeist of the AI pop culture envisions a future defined by a hyper intelligent singularity. In this worldview, digital AI villains will coexist with humans, as abstracted, ethically deprived and omnipotent overlords that will control our very existence. We are led to believe in a future world of superintelligence that has moved beyond our comprehension, and therefore we as humans are running the risk of abdicating our greatest gift and responsibility – the human rationality! The utopian vision of general AI (as opposed to its limited pattern-matching current incarnation) is based on the extrapolation of the past exponential growth of computer power. This growth extrapolation is core to the belief that “singularity is near”. The phenomenally complex problem of General AI is a non-numeric one. According to leading experts like Prof. Leslie Valiant [2], it is plainly wrong to assume that human intelligence is a computationally bound problem. According to Immanuel Kant being human means having consciousness and virtuous behaviour. If one believes in the thesis that humanity requires consciousness, the myth of virtual humans could be exposed for what it is, i.e., an irrational construct that negates the very nature of humans. To embed human intelligence in an agent would require programming consciousness into it. This is not a computational problem that will be solved as Moore’s Law continues playing out over time. There is no level of computer power where one may have any indication that a computer would magically have consciousness. This is not a processing or memory limit bound problem, and finding a solution is not a natural consequence of just increased computational power.
Since the beginning of the AI era, the goal of emulating human intelligence was central to this new field of science. The “human-imitative” view has later evolved towards the development of a more applicable engineering discipline in which algorithms and data are brought together to solve a variety of pattern recognition, learning, and decision-making problems. More and more, the AI research started to intersect with other engineering and scientific disciplines. A different approach was adopted, where the “human-imitative” perspective was replaced by a more practical one – “intelligence-augmentation”. The systems needed not to be intelligent themselves, but to reveal patterns that humans could use. Examples are search engines, recommender systems of natural language translation.
While solving the challenge of understanding General Intelligence will be quintessential to the development of Artificial Intelligence it may also represent the foundation of a new branch of engineering. Like many other classic engineering disciplines that have emerged in the past (i.e. Civil, Electrical or Chemical), this new engineering discipline is going to be built on already mature concepts such as information, data, algorithm, computing and optimization. Some people call this new discipline Data Science. No matter the label employed, this new field will be focused on leveraging large amounts of data to enhance human life, so its development will require perspectives from a variety of other disciplines; from quantitative sciences like Mathematics and Statistics to Computational, Business and Social sciences.
3. THE CURRENT STATUS
The accelerated pace of technological progress of the past decades has contributed to the generation of vast amounts of data, and the birth of what one calls the “Big Data” age. Recent advances in High Performance Computing (HPC) and hardware acceleration (GPUs and FPGAs), coupled with new discoveries in algorithmic processing has created the conditions to train and utilize very complex Machine Learning algorithms at an unprecedented speed. All these new technological developments are going to have a revolutionary impact on many industries, and as usual, the financial industry will most likely be at the forefront of it. A new concept is already making its way in today’s financial world: “Data-Driven Decision Making”. Nowadays both trading and investing are more and more driven by large-scale data analysis, and the new concept of “alternative” data is becoming more ubiquitous.
The most important development of the last decade, i.e. the advent of Deep Learning, came as a surprise to many researchers in the field of AI. It was the result of combining the availability of massive amounts of data with great computational power, and it was assisted by new innovations in the field of hardware acceleration. The use of this novel approach has yielded surprising outcomes, particularly in speech and image recognition, as well as for most classification tasks.
Another exciting new field of research for the ML community is related to the problem of learning to learn. The goal of Meta-Learning is to train a model on a variety of learning tasks, such that it can solve new learning tasks using only a small number of training samples. Fast learning is a hallmark of human intelligence. Recognizing objects from a limited number of observations or rapidly learning new skills after a limited practice is something that a human could do “by default”. The next generation of “artificial” agents should be able to learn and adapt quickly after being exposed to only a few examples and continuing to adapt as more data becomes available. As an example, the Alpha Go program that beat the Go world’s champion cannot hold a simple conversation about the game of Chess for which it was not trained. By contrast, a human can adapt and act “intelligently” to a wide range of new, unseen situations. Enabling the “artificial” agents to acquire such versatility is will be the next big revolution in Computational Intelligence.
The ML algorithms have an implicit problem space where they could be extremely effective – i.e. speech and image recognition. One of the most important questions that need to be addressed is whether ML algorithms could be successfully applied to financial problems. This exercise will require a solid understanding of the nature of the problem space. What is really special about the financial markets? How are the characteristics of this particular problem space going to impact the applicability of general-purpose ML algorithms? In order to answer all these important questions, one needs to carefully consider the nature of several important mechanisms that are responsible for the uniqueness of financial market data, such as:
- **The Data generation process** – is the process that generated the data stationary such as to ensure that training and testing could be performed on the same “kind” of data?
- **The Data quality** – is the financial market data associated with “manageable” noise-to-signal ratio such that overfitting will be kept under control?
- **The Dimensionality of the feature space** – could one engineer a feature space of enough dimensions such that the “measurable” properties of the financial markets could be properly learned by the ML algorithms?
- Moving from the current paradigm of “Representation Learning” (or learning by “imitation” from data) to a paradigm of “Machine Consciousness” (where the agent will be able to make decisions based on independent “thinking” by using an approach that is more akin to human behaviour) is still a distant milestone.
Until these disruptive scientific and technological breakthroughs will occur, the best course of action is to continue to make steady progress on automating some of the most complex tasks at hand and in finding new ways of learning from data by using the great computational tools already available. At the same time, we would need to redirect the focus of the education process form mastering ever more complex tools and frameworks, to the development of solid and scalable “problem-solving” skills. One should hope that this quantitative accumulation of knowledge will one day mutate into the great discovery that will trigger the “singularity” point.
CONCLUSIONS
Recognizing Data as the principal contemporary artifact used to “encode” the surrounding reality, will shed more light into the importance of deeply understanding the generative processes associated with the observed data. The idea that the availability of more data is enough to solve any problem is simply incorrect. The sheer amount of available data or the availability of the most efficient algorithms and fastest compute platforms are not going to magically make up for the lack of understanding of the process that generates the data. Data by itself is nothing more than an opaque artifact that needs to be captured, filtered, analyzed and modelled in order to decipher from it the true meaning of the process that generates it. Identifying and understanding the nature of the process that generates the Data should be the ultimate goal of Data Science. The goal of this paper was to create some awareness about both the promises and the formidable challenges that the new era of Data-Driven Decision-Making is bringing forth for the financial industry. This also could be seen as a message of confidence in the possibilities offered by the new era of Data Exploration. At the same time, practitioners need to have realistic expectations of these possibilities, since moving from the current paradigm of “Representation Learning to a paradigm of “Machine Consciousness” is still a distant milestone. Until research in Cognitive sciences makes more progress in the understanding of how human intelligence works and how it can be emulated, financial quantitative practitioners will have to concentrate their efforts on applying novel Computational Intelligence methods [2] to their specific problem domain and focus on improving the automation aspects of the process that transforms financial Data into actionable market Intelligence.
I will conclude by making a prediction about the emergence of a new engineering discipline, one that I would label as d2Ice - data-driven intelligence and computational engineering. This new engineering discipline will be at the same time Data-driven, Computationally intensive, Biology-inspired and Human-centered. All of these components will need to coexist and to be nourished with up-to-date knowledge in order to properly develop the new breed of engineer of the 21st century. This new profession will represent a significant evolution in respect to the quant of the 20th century, as it will address the needs of the modern economy by making itself available to a variety of industries, way beyond the realm of the Finance. Fields like Medicine, Healthcare, Education and the Internet-of-Things are going to be big consumers of this novel specialty. Since the modern society is so immersed and dependent on data and the methods to extract actionable information from it, this new breed of engineers will
position themselves at the core of the system that drives the most important business decisions. This new discipline will fulfill a very important societal role and will have a critical contribution to the success of next industrial revolution.
REFERENCES
[1] Jim Grey, “The Fourth Paradigm: Data-Intensive Scientific Discovery”, Microsoft Research, 2009. Content available at: http://itre.cis.upenn.edu/my/JimGrayOnE_Science.pdf
[2] Leslie Valiant, “Probably Approximately Correct”, published by Basic Books, NY, 2013
Lukasz SPRUCH
Lukasz is a Reader (Associate Professor) at the School of Mathematics, University of Edinburgh. He is also the director of Finance and Economics programme at The Alan Turing Institute, London. Previously Lukasz was a Nomura Junior Research Fellow at the Institute of Mathematics, University of Oxford, and a member of the Oxford-Man Institute for Quantitative Finance.
Lukasz has a broad research interest in Quantitive Finance, Machine and Reinforcement Learning, Statistics and Mean-Field Game Theory.
Blanka HORVATH
Dr Blanka Horvath is a Lecturer in Financial Mathematics at King’s College London as well as a Honorary Lecturer at Imperial College London and a researcher at The Alan Turing Institute, where she is co-lead of the Machine Learning in Finance theme. Blanka holds a PhD in Financial Mathematics from ETH Zurich, a postgraduate Diplom in pure Mathematics from the University of Bonn and an MSc in Economics from the University of Hong Kong. In her latest research she focusses on non-Markovian models of financial markets such as Rough Volatility models as well as modern DNN-based market generators. Prior to her position at King’s College, Blanka worked at JP Morgan on the refinements of the Deep Hedging programme. Her work on DNN-based calibration of Rough Volatility models was awarded the Rising Star Award 2020 of Risk magazine.
Michel CROUHY
Dr. Michel Crouhy is Senior Advisor to the “Direction Generale” of Natixis, and was until recently Head of Research & Development at NATIXIS Corporate and Investment Bank, a subsidiary of Groupe BPCE (Banques Populaires – Caisses d’Epargne). He is currently in charge of implementing a “Scenario-Based Stress Testing Framework” which is fully integrated into the capital and liquidity planning process of the bank. He is also the founder and chairman of the scientific committee of the NATIXIS Foundation for Research and Innovation, which promotes and supports academic research and world-class events in the area of mathematical finance and data science.
Formerly, Crouhy was senior vice president in the Risk Management Division, at the Canadian Imperial Bank of Commerce (CIBC), in charge of risk analytics, model vetting and model risk management, operational risk, economic capital attribution and customer behaviour analytics. Prior to his career in the industry, Crouhy was a professor of finance at the HEC School of Management in Paris. He has been a visiting professor at the Wharton School of the University of Pennsylvania and at the University of California, Los Angeles.
Crouhy is a founding member of PRMIA, the Professional Risk Managers’ International Association. He is a member of the Research Advisory Council of the Global Risk Institute in Financial Services and of the Credit Committee of the International Association of Financial Engineers (IAFE). He is a member of the Scientific Executive Board of the “Institut Louis Bachelier”. He is the author and co-author of several books, the most recent ones being “Risk Management” (McGraw-Hill – 2001), “The Essentials of Risk Management” (McGraw-Hill – second edition in 2014) and “Contingent Claims Analysis in Corporate Finance” (World Scientific – 2019). Crouhy holds a PhD from the Wharton School of the University of Pennsylvania and is a Doctor Honoris Causa from the University of Montreal.
Zvi WEINER
Professor Zvi Wiener is the head of the Finance Department at the Business School of the Hebrew University of Jerusalem. His areas of expertise include risk management, financial engineering and the valuation of complex financial products. Zvi Wiener is one of the founders of PRMIA (Professional Risk Managers’ International Association, see www.prmia.org), has served as a co-chair of the worldwide Education and Standards Committee of PRMIA and is currently a co-director of PRMIA Israel. His research was published in financial journals including the Journal of Finance, the Review of Financial Studies, Journal of Banking and Finance, Journal of Derivatives, Journal of Corporate Finance and many others and can be found at his website: http://pluto.mscc.huji.ac.il/~mswiener. In 2014 he was awarded the Teva Prize named after Dani Suesskind for research on dividend policy, in 2012 he received PRMIA award for Outstanding Service and Leadership, in 1997 he received the Alon Fellowship and in 1994 the Rothschild Fellowship. In the years 1996, 2005, 2013 and 2015 he received research grants from the Israel Academy of Sciences. Zvi Wiener has a rich consulting experience. He consulted the Ministry of Finance, the Ministry of Defense, the Bank of Israel, the Israel Securities Authority, the Tel Aviv Stock Exchange, credit rating companies, many banks, insurance firms and pension funds, as well as leading law firms on various financial problems.
Dan GALLAI
Dr. Dan Galai is the Abe Gray Professor of Finance and Business Administration at the Hebrew University, school of business administration in Jerusalem. He was a visiting professor of finance at INSEAD and at the University of California, Los Angeles and has also taught at the University of Chicago and at the University of California, Berkeley.
Dr. Galai holds a Ph.D. from the University of Chicago and undergraduate and graduate degrees from the Hebrew University. He has served as a consultant for the Chicago Board of Options Exchange and the American Stock Exchange as well as for major banks. He has published numerous articles in leading business and finance journals, on options, risk management, financial markets and institutions, and corporate finance. He is a coauthor of Risk Management published by McGraw-Hill, July 2000.
MODEL BASED MACHINE LEARNING
Lukasz SPRUCH,
Reader (Associate Professor) at the School of Mathematics, University of Edinburgh and Director of Finance and Economics programme at The Alan Turing Institute, London.
1. INTRODUCTION
Mathematical and Statistical modelling is ubiquitous in the financial industry and drives key decision processes. Broadly, one can distinguish between two approaches to mathematical modelling [Lehman, 1990, Cox et al., 1990, Hand, 2019]. The first approach that goes under the name phenomenological, handcrafted or iconic modelling is based on the formulation of a simplified representation of phenomena we aim to model. The second approach, known as empirical or data driven, seeks to summarise the relationships in the data is some convenient way, and the model, typically, does not have any theoretical bases. The former approach is dominant in the world of quantitative finance, where one often seeks parsimonious models that can be well-calibrated to data, the latter is at the heart of modern machine learning which is extremely effective in extracting statistical relationships in seemingly large dimensional datasets but their black-box natures means that the individual parameters do not have a meaningful interpretation.
The recent advances in machine learning bring new opportunities to quantitative, and with greater computational power, more complex models can now be used. This is due to the fact that arguably the most complicated and computationally expensive step of calibration has been addressed. Indeed, in the seminal paper [Hernandez, 2016] used neural networks to learn the calibration map from market data directly to model parameters. Subsequently, many papers followed [Liu et al., 2019, Ruf and Wang, 2019, Ruf and Wang, 2019, Benth et al., 2020, Gambara and Teichmann, 2020, Sardroudi, 2019, Horvath et al., 2019, Bayer et al., 2019, Bayer and Stemper, 2018, Viales et al., 2018, Cuchiero et al., 2020]. These approaches focused on the calibration of the fixed parametric model but did not address perhaps even the more important issue, which is model selection and model uncertainty. The question of how seamlessly integrated modern machine learning methods with well-understood risk models that are currently used in the finance industry is perhaps the most critical. While these new techniques bring many new opportunities, they also carry new risks. Many of the machine learning tools produce opaque models that do stand on the solid mathematical foundation and do not back by decades of research in the area of quantitative finance.
In recent work [Perez Arribas et al., 2020, Gierjatowicz et al., 2020] authors showed that it possible to combine both approaches achieving the best of both worlds. By augmenting classical risk models with modern machine learning approaches, we are able to benefit from expressibility of neural networks or signature of the path, while staying within the realm of classical models, well understood by traders, risk managers and regulators. This mitigates, to some extent, the concerns that regulators have around the use of black-box solutions to manage financial risk.
These models, called Neural-SDEs or Sig-SDEs, depending on the choice of feature space can be used to find robust bounds for prices of derivatives and the corresponding hedging strategies while incorporating relevant market data. These models are an instantiation of generative modelling and are closely linked with the theory of causal optimal transport. Neural- and Sig-SDEs allow consistent calibration under both the risk-neutral and the real-world measures. Thus the model can be used to simulate market scenarios needed for assessing risk profiles and hedging strategies.
In Neural- and Sig-SDE setting we let the data dictate the model, while still keeping a strong prior on the model form. This is achieved by using SDEs for the model dynamics but instead of choosing a fixed parametrization for the model SDEs we allow the drift and diffusion to be given by an overparametrized neural networks or linear combination of the (log)signature terms. Neural and Sig-SDE are shown to not only provide a systematic framework for model selection, but also, quite remarkably, to produce robust estimates on the derivative prices. Here, the calibration and model selection are done simultaneously. In this sense, model selection is data-driven. For the neural SDE model is overparametrised, and there is a large pool of possible models and the training algorithm selects a model. For Sig-SDEs one can benefit from linear structure and decide whether it is more appropriate to work with over or under parametrised model. To simplify the presentation from now on, we focus on neural-SDEs and refer the reader for related ideas presented in signature feature space to [Perez Arribas et al., 2020]. We believe that it is helpful to view these new approaches to modelling in finance through the lens of robust finance paradigm.
2. ROBUST FINANCE PARADIGM
Let us now consider a probability space \((\Omega, \mathcal{F}, (\mathcal{F}_t)_{t \in [0,T]}, \mathbb{P})\) and a random variable \(\Psi \in L^2(\mathcal{F}_T)\) that represents the discounted payoff of a illiquid (path-dependent) derivative. The problem of calculating a market consistent price of a financial derivative can be seen as equivalent to finding a map that takes market data (e.g. prices of underlying assets, interest rates, prices of liquid options) and returns the no-arbitrage price of the derivative. Typically an Ito process \((X^\theta_t)_{t \in [0,T]}\), with parameters \(\theta \in \mathbb{R}^p\) has been the main component used in constructing such pricing function. Such parametric model induces a martingale probability measure, denoted by \(\mathbb{Q}(\theta)\), which is then used to compute no-arbitrage price of derivatives. The market data (input data) here is represented by payoffs \(\{\Phi_i\}_{i=1}^M\) of liquid derivatives, and their corresponding market prices \(\{p(\Phi_i)\}_{i=1}^M\). We will assume throughout that this price set is free of arbitrage. To make the model \(\mathbb{Q}(\theta)\) consistent with market prices, one seeks parameters \(\theta^*\) such that the difference between \(p(\Phi_i)\) and \(\mathbb{E}^{\mathbb{Q}(\theta^*)}[\Phi_i]\) is minimized for all \(i = 1, \ldots, M\) (w.r.t. some metric). If for all \(i = 1, \ldots, M\) we have \(p(\Phi_i) = \mathbb{E}^{\mathbb{Q}(\theta^*)}[\Phi_i]\) then we will say the model is consistent with market data (perfectly calibrated). There may be infinitely many models that are consistent with the market. This is called Knightian uncertainty [Knight, 1974, Cohen et al., 2018].
Let \(\mathcal{M}\) be the set of all martingale measures / models that are perfectly calibrated to market inputs. In the robust finance paradigm, see [Hobson, 1998, Coe and Obloj, 2011], one takes conservative approach and instead of computing a single price (that corresponds to a model from \(\mathcal{M}\)) one computes the price interval \((\inf_{Q \in \mathcal{M}} \mathbb{E}^Q[\Psi], \sup_{Q \in \mathcal{M}} \mathbb{E}^Q[\Psi])\). The bounds can be computed using tools from martingale optimal transport which, through dual representation, yields corresponding super- and sub-hedging strategies, [Beiglböck et al., 2013]. Without imposing further constrains, the class of all calibrated models \(\mathcal{M}\) might be too large and consequently the corresponding bounds too wide to be of practical use [Eckstein et al., 2019]. See however an effort to incorporate further market information to tighten the pricing interval, [Nadtochiy and Obloj, 2017, Aksamit et al., 2020]. Another shortcoming of working with the entire class of calibrated models \(\mathcal{M}\) is that, in general, it is not clear how to obtain a practical/explicit model out of the measures that yields price bounds. For example, such explicit models are useful when one wants consistently calibrate under pricing measure \(\mathbb{Q}\) and real-world measure \(\mathbb{P}\) as needed for risk estimation and stress testing, [Broadie et al., 2011, Pelsser and Schweizer, 2016] or learn hedging strategies in the presence of transactional cost and an illiquidity constrains [Buehler et al., 2019].
3. NEURAL SDES
Fix $T > 0$ and for simplicity assume constant interest rate $r \in \mathbb{R}$. Consider parameter space $\Theta = \Theta^b \times \Theta^\sigma \subseteq \mathbb{R}^p$ and parametric functions $b : \mathbb{R}^d \times \Theta^b \to \mathbb{R}^d$ and $\sigma : \mathbb{R}^d \times \Theta^\sigma \to \mathbb{R}^{d \times n}$.
Let $(W_t)_{t \in [0, T]}$ be a $n$-dimensional Brownian motion supported on $(\Omega, \mathcal{F}, (\mathcal{F}_t)_{t \in [0, T]}, \mathbb{Q})$ so that $\mathbb{Q}$ is the Wiener measure and $\Omega = C([0, T]; \mathbb{R}^n)$. We consider the following parametric SDE
$$dX_t^\theta = b(t, X_t^\theta, \theta) \, dt + \sigma(t, X_t^\theta, \theta) \, dW_t.$$
(1)
We split $X^\theta$ which is the entire stochastic model into traded assets and non-tradable components. Let $X^\theta = (S^\theta, V^\theta)$, where $S$ are the traded assets and $V$ are the components that are not traded. We will assume that for all $t \in [0, T], x = (s, v) \in \mathbb{R}^d$ we will assume that $b(t, (s, v), \theta) = (rs, b^V(t, (s, v), \theta))$ and $\sigma(t, (s, v), \theta) = (\sigma^S(t, (s, v)), \sigma^V(t, (s, v), \theta))$. Then we can write (1) as
$$dS_t^\theta = rS_t^\theta \, dt + \sigma^S(t, X_t^\theta, \theta) \, dW_t,$$
$$dV_t^\theta = b^V(t, X_t^\theta, \theta) \, dt + \sigma^V(t, X_t^\theta, \theta) \, dW_t,$$
$$X_0^\theta = (S_0^\theta, V_0^\theta).$$
(2)
Observe that $\sigma^S$ and $\sigma^V$ encode arbitrary correlation structures between the traded assets and the non-tradable components. Moreover, we immediately see that $(e^{-rt}S_t)_{t \in [0, T]}$ is a (local) martin gale and thus the model is free of arbitrage.
In a situation when $(b, \sigma)$ are defined to be neural networks, we denote by $\mathcal{M}^{\text{nnsd}}(\theta)$ the class of all solutions to (1). Note that due to universal approximation property of neural net works, see [Hornik, 1991, Sontag and Sussmann, 1997, Cuchiero et al., 2019], $\mathcal{M}^{\text{nnsd}}(\theta)$ contains large class of SDEs solutions. Furthermore, neural networks can be efficiently trained with the stochastic gradient decent methods and hence one can easily seek calibrated models in $\mathcal{M}^{\text{nnsd}}(\theta)$. Finally, neural SDE integrate black-box neural network type models with the known and well studied SDE models. One consequence of that is that one can: a) consistently calibrate these under the risk neutral measure as well as the real-world measure; b) easily integrate additional market information e.g. constraints on realised variance; c) verify martingale property. Given a loss function $\ell : \mathbb{R} \times \mathbb{R} \to \mathbb{R}^+$, the search for calibrated model can be written as
$$\theta^* \in \arg \min_{\theta \in \Theta} \sum_{i=1}^M \ell(\mathbb{E}^{\mathbb{Q}(\theta)}[\Phi_i], p(\Phi_i)), \text{ where } \mathbb{E}^{\mathbb{Q}(\theta)}[\Phi] = \int_{C([0, T], \mathbb{R}^d)} \Phi(\omega) \mathcal{L}(X^\theta)(d\omega).$$
Let us connect neural SDEs to the concept of generative modelling, see [Goodfellow et al., 2014, Kingma and Welling, 2013]. Let $\mathbb{Q}^{\text{market}} \in \mathcal{M}$ be the true martingale measure (so by definition all liquid derivatives are perfectly calibrated under this measure), i.e. $\mathbb{E}^{\mathbb{Q}^{\text{market}}}[\Phi_i] = p(\Phi_i)$ for all $i = 1, \ldots, M$. We know that when (1) admits a strong solution then for any $\theta \in \mathbb{R}^p$ there exists a measurable map $G^\theta : \mathbb{R}^d \times C([0, T]; \mathbb{R}^n) \to C([0, T]; \mathbb{R}^d)$ such that $X^\theta = G^\theta(\cdot, W)$. Hence, one can view (1) as a generative model that maps $\mu$, the joint distribution of $X_0$ on $\mathbb{R}^d$ and the Wiener measure on $C([0, T]; \mathbb{R}^n)$ into $\mathbb{Q}^\theta = (G^\theta)_{\#}\mu$. We see that by construction $G$ is a causal transport map i.e. transport map that is adapted to filtration $(\mathcal{F}_t)_{t \in [0, T]}$, see also [Acciaio et al., 2019, Lassalle, 2013].
One then seeks $\hat{\theta}^*$ such that $G^{\hat{\theta}^*}_{\#}\mu$ is a good approximation of $\mathbb{Q}^{\text{market}}$ with respect to user specified metric. In this paper we work with
$$D(G^{\hat{\theta}^*}_{\#}\mu, \mathbb{Q}^{\text{market}}) := \sum_{i=1}^M \ell \left( \int_{C([0, T], \mathbb{R}^d)} \Phi_i(\omega)(G^{\hat{\theta}^*}_{\#}\mu)(d\omega), \int_{C([0, T], \mathbb{R}^d)} \Phi_i(\omega)\mathbb{Q}^{\text{market}}(d\omega) \right).$$
There are many Neural SDE models that can be calibrated well to market data and that produce significantly different prices for derivatives that were not part of the calibration data. In practice these would be illiquid derivatives where we require model to obtain prices. Therefore, we compute price intervals for illiquid derivatives within the class of calibrated neural SDEs models. To be more precise we compute
$$\inf_{\theta} \left\{ \mathbb{E}^{\mathbb{Q}(\theta)}[\Psi] : D(G(\theta)_{\#}\mu_0, \mathbb{Q}^{\text{market}}) = 0 \right\}, \sup_{\theta} \left\{ \mathbb{E}^{\mathbb{Q}(\theta)}[\Psi] : D(G(\theta)_{\#}\mu_0, \mathbb{Q}^{\text{market}}) = 0 \right\}.$$
4. CONCLUSIONS
i. Neural SDEs provide a systematic framework for model selection and produce robust estimates on the derivative prices. The calibration and model selection are done simultaneously and the thus the model selection is data-driven.
ii. With neural SDEs, the modelling choices one makes are: networks architectures, structure of neural SDE (e.g. traded and non-traded assets), training methods and data. For classical hand crafted models the choice of the algorithm for calibrating parameters has not been considered as part of modelling choice, but for machine learning this is one of the key components. In it has been shown in [Gierjatowicz et al., 2020] that the change in initialisation of stochastic gradient method used for training leads to different prices of illiquid options, thus providing one way of obtaining price bounds. Furthermore even for basic local volatility model that is unique for continuum of strikes and maturities, produces ranges of prices of illiquid derivatives when calibrated to finite data sets.
iii. The above optimisation problem is not convex. Nonetheless, empirical experiments in [Gierjatowicz et al., 2020] demonstrate that the stochastic gradient decent methods used to minimise the loss functional $D$ converges to the set of parameters for which calibrated error is of order $10^{-6}$ to $10^{-4}$ for the square loss function. Theoretical framework for analysing such algorithms is being developed in [Siska and Szpruch, 2020].
REFERENCES
[Acciaio et al., 2019] Acciaio, B., Backhoff-Veraguas, J., and Zalashko, A. (2019). Causal optimal transport and its links to enlargement of filtrations and continuous-time stochastic optimization. Stochastic Processes and their Applications.
[Aksamit et al., 2020] Aksamit, A., Hou, Z., and Obloj, J. (2020). Robust framework for quantifying the value of information in pricing and hedging. SIAM Journal on Financial Mathematics, 11(1):27–59.
[Bayer et al., 2019] Bayer, C., Horvath, B., Muguruzza, A., Stemper, B., and Tomas, M. (2019). On deep calibration of (rough) stochastic volatility models.
[Bayer and Stemper, 2018] Bayer, C. and Stemper, B. (2018). Deep calibration of rough stochastic volatility models.
[Beiglböck et al., 2013] Beiglböck, M., Henry-Labordere, P., and Penkner, F. (2013). Model-independent bounds for option prices—a mass transport approach. Finance and Stochastics, 17(3):477–501.
[Benth et al., 2020] Benth, F. E., Detering, N., and Lavagnini, S. (2020). Accuracy of deep learning in calibrating HJM forward curves. arXiv preprint arXiv:2006.01911.
[Broadie et al., 2011] Broadie, M., Du, Y., and Moallemi, C. C. (2011). Efficient risk estimation via nested sequential simulation. Management Science, 57(6):1172–1194.
[Buehler et al., 2019] Buehler, H., Gonon, L., Teichmann, J., and Wood, B. (2019). Deep hedging. Quantitative Finance, pages 1–21.
[Cohen et al., 2018] Cohen, S. N. et al. (2018). Data and uncertainty in extreme risks-a nonlinear expectations approach. World Scientific Book Chapters, pages 135–162.
[Cox and Obloj, 2011] Cox, A. M. and Obloj, J. (2011). Robust hedging of double touch barrier options. SIAM Journal on Financial Mathematics, 2(1):141–182.
[Cox et al., 1990] Cox, D. R. et al. (1990). Role of models in statistical analysis. Statistical Science, 5(2):169–174.
[Cuchiero et al., 2020] Cuchiero, C., Khosravi, W., and Teichmann, J. (2020). A generative adversarial network approach to calibration of local stochastic volatility models. arXiv preprint arXiv:2005.02505.
[Cuchiero et al., 2019] Cuchiero, C., Larsson, M., and Teichmann, J. (2019). Deep neural networks, generic universal interpolation, and controlled odes. arXiv preprint arXiv:1908.07838.
[Eckstein et al., 2019] Eckstein, S., Guo, G., Lim, T., and Obloj, J. (2019). Robust pricing and hedging of options on multiple assets and its numerics. arXiv preprint arXiv:1909.03870.
[Gambara and Teichmann, 2020] Gambara, M. and Teichmann, J. (2020). Consistent recalibration models and deep calibration. arXiv preprint arXiv:2006.09455.
[Gierjatowicz et al., 2020] Gierjatowicz, P., Sabate-Vidales, M., Si´ ska, D., Szpruch, L., and ´ Zur´ e c, Z. (2020). Robust ´ pricing and hedging via neural sdes. arXiv preprint arXiv:2007.04154.
[Goodfellow et al., 2014] Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville, A., and Bengio, Y. (2014). Generative adversarial nets. In Advances in neural information processing systems, pages 2672–2680.
[Hand, 2019] Hand, D. (2019). What is the purpose of statistical modelling? Harvard Data Science Review, 1(1).
[Hernandez, 2016] Hernandez, A. (2016). Model calibration with neural networks. Risk.
[Hobson, 1998] Hobson, D. G. (1998). Robust hedging of the lookback option. Finance and Stochastics, 2(4):329–347.
[Hornik, 1991] Hornik, K. (1991). Approximation capabilities of multilayer feedforward networks. Neural Networks, 4(2):251–257.
[Horvath et al., 2019] Horvath, B., Muguruza, A., and Tomas, M. (2019). Deep learning volatility.
[Kingma and Welling, 2013] Kingma, D. P. and Welling, M. (2013). Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114.
[Knight, 1971] Knight, F. H. (1971). Risk, uncertainty and profit, 1921. Library of Economics and Liberty.
[Lassalle, 2013] Lassalle, R. (2013). Causal transference plans and their monge-kantorovich problems. arXiv preprint arXiv:1303.6925.
[Lehman, 1990] Lehman, E. L. (1990). Model specification: The views of fisher and neyman, and later observations. Statistical Science, 5:160–8.
[Liu et al., 2019] Liu, S., Borovykh, A., Grzelak, L. A., and Oosterlee, C. W. (2019). A neural network-based framework for financial model calibration. Journal of Mathematics in Industry, 9(1):9.
[Nadtochiy and Obloj, 2017] Nadtochiy, S. and Obloj, J. (2017). Robust trading of implied skew. International Journal of Theoretical and Applied Finance, 20(02):1750008.
[Pelsser and Schweizer, 2016] Pelsser, A. and Schweizer, J. (2016). The difference between lsmc and replicating portfolio in insurance liability modeling. European actuarial journal, 6(2):441–494.
[Perez Arribas et al., 2020] Perez Arribas, I., Salvi, C., and Szpruch, L. (2020). Sig-sdes model for quantitative finance. arXiv, pages arXiv–2006.
[Ruf and Wang, 2019] Ruf, J. and Wang, W. (2019). Neural networks for option pricing and hedging: a literature review. Available at SSRN 3486363.
[Sardroud, 2019] Sardroud, W. K. (2019). Polynomial semimartingales and a deep learning approach to local stochastic volatility calibration.
ON THE TRANSFORMATIVE ROLE OF NEW TECHNOLOGIES ON MARKET MODELS IN QUANTITATIVE MODELLING
Blanka HORVATH,
Lecturer in Financial Mathematics at King’s College London as well as a Honorary Lecturer at Imperial College London and a researcher at The Alan Turing Institute
THE RELATIONSHIP OF CLASSICAL QUANTITATIVE FINANCE MODELS AND DEEP LEARNING
Deep learning has undoubtedly had a major impact on the possibilities of mathematical modelling in finance. The application of deep neural networks in this field has helped push the boundaries of the achievable further in terms of:
- providing numerical alternatives to established means of forecasting, pricing and hedging,
- speeding up calculations beyond what was possible with traditional numerical methods, and modelling higher dimensional scenarios than previously possible,
- finding (approximatively) optimal strategies under consideration of market frictions, beyond the regimes that were analysed and understood by classical methods,
- but also in terms of generalisations of the very concept of a financial market model to what we now call market generators.
This is by far no exhaustive list of the many avenues through which financial modelling is aided today by deep learning. With the above examples we are only scratching the surface of a wealth of ongoing developments.
But perhaps conceptually more important than the direct impacts listed above is an emerging symbiosis of algorithms and the data. The influence and impacts in this symbiosis goes both ways:
Data used in training influences the algorithms and the chosen architecture has implications on the structure of data on which it can be applied reliably. The former comes as no surprise: Deep learning models being so flexible, the data used for training influences the type of output of the application. The latter in turn calls for rethinking risk management routines profoundly. Effects of the latter influence are visible for example in [2, 12, 13], where a suitable network architecture has decisive implications on network performance. Risk management should therefore include ongoing monitoring on the structure of the data and the suitability of the network architecture to that data as well as regular updates of the training data that algorithms are exposed to.
THE CASE FOR MORE FLEXIBLE DATA-DRIVEN MARKET MODELS: The technological advances and tools developed in recent years create the desire for market models that are directly data-driven and closely reflect evolving market reality. The implications of the influence of data on algorithms becomes quite visible in [4]: When training data is numerically generated by the Black-Scholes model, the trained network (the hedging engine) approximates the corresponding delta as an optimal hedging strategy. Analogous effects can be seen when the training data is generated by Heston paths. In fact, the approach in [4] is inherently model agnostic: For an arbitrary collection of sample paths provided to the network in the training phase, the hedging engine generates response strategies that are indeed approximatively optimal in market regimes where path distributions resemble the ones presented during the training phase. The more realistic the market paths presented to the network during the training phase, the better performance can be expected on real data. Classical models are however known to suffer from a relative inflexibility. This and similar model-agnostic neural network based financial applications therefore drove interest towards such market scenario generators (or simply market generators) that are capable of closely reflecting real market dynamics, in a model-free and directly data driven way. This leads us back to neural networks as powerful approximators of functions and distributions to build generative models for financial markets. Such generative models are based on the idea of transforming random samples of latent variables to distributions observed in data samples via differentiable functions, which are approximated by a neural network by backpropagation. The application of such frameworks to financial settings is what we refer to as market generators. The case for classical models: Market generation is currently still in its infancy. The flexibility of these models, the great variety in which they appear and their inherent synergy with the data are all factors that make them difficult to risk manage. Classical models on the other hand are well understood and a wealth of research and analysis of their properties is available, and so is decades worth of experience in their risk management. Furthermore, classical models have also been developed with the aim to reflect (despite their relative inflexibility) a selection of stylized facts of financial markets [8]. Some model families [10] have the impressive ability to exhibit these with a remarkable precision and provide an overarching theoretical basis for their behaviour across markets and applications. Most importantly, the distribution and dynamical properties of classical models can be carefully controlled by a handful set of parameters at each point in time. They can therefore conveniently provide training sets for deep learning algorithms (see [13]) where certain properties of the training set are present or absent to test the robustness of a deep learning algorithm under those market conditions. Synergies: Through the available analytical and numerical solutions classical models also provide much needed benchmarks—in the cases where these are applicable—for deep learning applications to facilitate risk management of the latter. On the other hand, approximative solutions obtained by neural networks can facilitate finding analytical solutions for classical models under market conditions where these hadn’t been available.
THE TRANSFORMATIVE POTENTIALS OF MARKET GENERATION
In several situations it is advantageous to rely on simulated data rather than working with data directly. Market generators—in contrast to classical models—are so flexible that they are capable of generating data samples that are statistically indistinguishable from a given original dataset. This flexibility opens the door to applications that were so far not typically a core part of financial modelling in the classical setting.
Applications of Market Generators: Sailing on new waters of modelling,
(i) Data anonymisation: When the available data is confidential, it is desirable to generate anonymised datasets that are representative of the true underlying distribution of the data but cannot be traced back to their origin. Financial data and medical data are often proprietary, or confidential. When testing investment strategies or the effectiveness of a treatment it is imperative not to be able to trace back the datasets to the individual client or patient. Evaluating whether the produced data is representative of the distribution that a dataset stems from, depends on the distributional properties (evaluation metrics) that we control for. Thus the question of adequate performance evaluation metrics is a central matter for research on market generators, see [5]. Also the level of anonymity achieved by such generative procedures is a highly interesting question on its own. The study presented in [16] is devoted to understanding the latter question in more detail.
(ii) Small original training datasets: Though big data as a concept is ubiquitous today, in more situations than not, the amount of data available for training a neural network is small rather than large. When there are natural restrictions on the number of available original samples (constraints on the number of experiments, restrictions on the access to data), the available data may not be sufficient to train the neural network application at hand (e.g. hedging engine). Clearly, the more complex the application, the more data samples are needed to train it.
Once such a generative network is available, more complex neural network applications can also be trained, using the market generator that produces the necessary amount of training samples for the latter. Generative models for sparse data environments therefore need to be relatively parsimonious and trainable on a low number of data samples. Further practical applications of market generators include (but are not limited to) the following use cases:
(iii) **Outlier detection**: Once the distribution of a dataset can be statistically identified and reproduced (even if the data does not follow any known parametric distribution) it becomes possible to identify typical regimes—that is, datapoints that are typical for the distribution—as well as outliers or atypical events. Detecting outliers and atypical events enables us to identify occurrences of regime switching in a market, gives the basis for fraud detection and for the identification of human-machine interfaces in automation: that is, such events that alert an automated machine to hand over the handling of an atypical process to a human with appropriate responsibilities.
(iv) **Backtesting**: When developing a trading strategy, carrying out a backtest to measure how the strategy would perform in a realistic environment is of crucial importance. However, using historical data may result in overfitting of the trading strategy. Having a market simulator capable of generating realistic, independent samples of market paths would allow a more robust backtest, less prone to overfitting.
(v) **Risk management of portfolios** – be it of financial derivatives or trading strategies – is of utmost importance. A realistic market simulator can be used to generate synthetic paths to estimate various risk metrics, such as Value at Risk (VaR). These applications are to date fairly unexplored, however they are gaining more and more relevance in a landscape where data increasingly assumes a central role in quantitative applications. And so, market generators have the very real potential of creating a whole new era of financial modelling.
**REFERENCES**
[1] D. Bartl, S. Drapeau, J. Obłój and J. Wiesel. Data driven robustness and uncertainty sensitivity analysis. In preparation, 2020.
[2] C. Bayer, B. Horvath, A. Muguруza, B. Stemper, and M. Tomas. On deep pricing and calibration of (rough) stochastic volatility models. Preprint, arXiv:1908.08806, 2019.
[3] P. Bonnier, P. Kidger, I. Perez Arribas, C. Salvi and T. Lyons. Deep Signature Transforms. ArXiv:1905.08494, 2019.
[4] H. Bühler, L. Ganon, J. Teichmann, and B. Wood. Deep hedging. Quantitative Finance, 19(8) p. 1271-1291, 2019.
[5] H. Bühler, B. Horvath, T. Lyons, I. Perez Arribaz, B. Wood. Generating financial markets with signatures. Preprint SSRN:3657366, 2020.
[6] C. Cuchiero, W. Khosrawi, J. Teichmann. A generative adversarial network approach to calibration of local stochastic volatility models. Preprint, arxiv.org:2005.02505, 2020.
[7] I. Chevyrev and H. Oberhauser. Signature moments to characterize laws of stochastic processes. Preprint, arxiv.org:1810.10971, 2018.
[8] R. Cont. Empirical properties of asset returns: stylized facts and statistical issues. Quantitative Finance, (1): 223-236, 2001.
[9] P. Friz, M. Hairer. *A Course on Rough Paths: With an Introduction to Regularity Structures*. Cham: Springer International Publishing, 2014.
[10] J. Gatheral, T. Jaisson, M. Rosenbaum. Volatility is rough, Quantitative Finance, 18:6, 933-949, 2018.
[11] P. Henry-Labordere. Generative models for financial data. Preprint, SSRN 3408007, 2019.
[12] B. Horvath, A. Muguruza, M. Tomas. Deep learning volatility. To appear in Quantitative Finance, 2020.
[13] B. Horvath, J. Teichmann, Z. Zuric. Deep Hedging under Rough Volatility. Working Paper, 2020.
[14] Patrick Kidger and Terry Lyons. Signatory: differentiable computations of the signature and logsignature transforms, on both CPU and GPU. Preprint, arXiv:2001.00706, 2020.
[15] A. Kondratyev, C. Schwarz. The market generator. Preprint, SSRN:3384948, 2019.
[16] A. Kondratyev, C. Schwarz, B. Horvath, Data anonymisation, outlier detection and fighting overfitting with Restricted Boltzmann Machines. Preprint, SSRN:3526436, 2020.
[17] T. Lyons. Rough paths, signatures and the modelling of functions on streams, Preprint, arXiv:1307.7244, 2014.
[18] H. Oberhauser and F. Kiraly. Kernels for sequentially ordered data. Journal of Machine Learning Research, 20(31):1-45, 2019.
THE IMPACT OF FINTECHS ON FINANCIAL INTERMEDIATION: A FUNCTIONAL APPROACH
Michel CROUHY, Dan GALAI and Zvi WIENER
EXTENDED SUMMARY
Fintech refers to the technological start-ups that are emerging to rival traditional banking and financial players. It covers a wide array of services from P2P and crowdfunding platforms, mobile payment solutions, international money transfers to online portfolio management tools, service comparators/aggregators (APIs), ICOs (Initial Coins Offerings), and more.
Recent technological innovations are disruptive for many industries, especially the financial industry. They have made possible the new financial intermediation offered by FinTech. Without the easy access to large digitalized dataset, the massive increase in storage capacity and processing capacities, especially with the “cloud”, FinTech would not have emerged. It’s been a while since we’ve seen a game-changer, but FinTech may be the one.
Bigtech is a subset of the broader fintech sector. Bigtech companies are defined as “…technology companies with established presence in the market for digital services”. In the U.S., bigtechs include the so-called “GAFAM” firms: Google, Amazon, Facebook, Apple and Microsoft. “BATX” refers to the four largest Chinese technology companies: Baidu, Alibaba, Tencent and Xiaomi. Bigtechs often started their finance activity in the payments sector as a means to facilitate their core business, e.g., e-commerce. They subsequently leveraged their platform to expand into vast ecosystems, which extend far beyond payments into other operations, such as lending, insurance, savings and investment products, either independently or in association with established financial institutions.
FinTech is not a natural evolution in financial intermediation but a true revolution. One major consequence of these technological improvements is disintermediation. The financial system being essentially an intermediary is first in line to be disintermediated.
The growth opportunities are huge. Venture capital funds were quick to recognize these opportunities and provide a significant amount of funding.
Previous academic review papers analyze the various areas of operations in which fintechs engage. We take a different approach and map fintechs based on the six functions of financial intermediation rather than on their main activities. We follow Merton’s functional approach in which the six core functions performed by a financial system are analyzed. According to Merton, a financial system provides:
A. A payment system for the exchange of goods and services;
B. A mechanism for the pooling of funds to undertake large-scale indivisible investments in an enterprise;
C. A way to transfer economic resources through time and across geographic regions and industries;
D. A way to manage uncertainty and control risk;
E. Price information that helps coordinate decentralized decision-making in various sectors of the economy;
F. A way to deal with asymmetric-information and incentive problems when one party to a financial transaction has information that the other party does not.
In banks all these core functions are fully integrated. Technology allows for the unbundling and fragmentation of financial services among specialized fintech companies. Fintechs deliver these services in a cheaper and friendlier way, and to new clients, not served by traditional institutions.
Banks offer basic services such as low-cost checking, and so-called “sticky customer relationships” used to allow them to earn attractive margins in other areas such as asset management, credit card fees, or foreign-exchange transactions. Banks have unique expertise in credit underwriting. They are heavily regulated and offer protection to depositors through deposit insurance. Historically, consumers have been very loyal customers and slow to change banking services providers. Banks still enjoy greater trust than tech companies, although it is changing.
Fintechs are moving beyond strictly addressing a customer’s financial needs (product-centric) to offering a wider range of services (platforms and ecosystems).
Let’s now address each of the six core functions of a financial system.
A. A PAYMENT SYSTEM FOR THE EXCHANGE OF GOODS AND SERVICES
The first core function of a financial system, i.e., “a payment system for the exchange of goods and services” is currently the area with the many new entrants with innovative products such as digital currencies also referred to as crypto-currencies or e-money, and mobile wallets.
Payments is today a great business; revenues totaling up to $1.9 trillion globally in 2018. Due to the pandemic, it is expected that the revenues from payments will decline by 7% in 2020 due to the reduction in the volume of transactions in the retail sector.
Mobile wallets have been widely adopted by consumers worldwide: Apple Pay, Ali Pay, WeChat Pay, Samsung Pay and Android Pay. Digital wallets are rapidly replacing cash in executing both customer-to-customer (C2C) and customer-to-business (C2B) transactions.
The adoption of digital wallets worldwide has been facilitated by the ubiquity of smartphones, particularly in developing countries where few have access to the banking system. A good example is Kenya, where M-Pesa® allows users to deposit money into an account linked to a cell phone, to send payments to sellers of goods and services, and to withdraw deposits for cash. It offers many of the essential services provided by banks without requiring customers to have a bank account. This feature of fintechs is termed -inclusion- of new unbanked customers.
There is a new wave of technological innovations that allows the transactional use of so-called “crypto-assets”, i.e., digital tokens recorded in distributed ledgers and held in electronic safety “wallets” stored in the cloud. In crypto-currency systems, encryption techniques control the generation of currency units with the use of blockchain technology or DLT (Distributed Ledger Technology). This technology allows person-to-person transactions, independently of the banking system, with transactions authenticated by many computers (miners), around the world without the need for a trusted financial intermediary like a bank to verify the transaction.
The cryptocurrency “Bitcoin” was the first implementation in 2009 of the blockchain technology. It has no intrinsic value, and fulfills only the first attribute, out of three we expect from money: medium of exchange, store of value and unit of account. It is a speculative investment, not a currency. Bitcoin has been followed by the creation of more than 2,000 cryptocurrencies, the most notable at this time being Ethereum. So far, the pricing of these cryptocurrencies has been highly speculative. Several initiatives have been launched to invent so-called “stablecoins”,
cryptocurrencies backed by real-world assets. To summarize, the “payments” industry is undergoing rapid changes driven by a combination of increasing customer demand, the need for technology investments and potential regulatory pressure. Fintech invaders have recognized the value of payments as a gateway to customer acquisition.
**B. A MECHANISM FOR THE POOLING OF FUNDS TO UNDERTAKE LARGE-SCALE INDIVISIBLE INVESTMENTS IN AN ENTERPRISE**
The second core function of a financial system according to Merton is “a mechanism for the pooling of funds to undertake large-scale indivisible investments in an enterprise”.
Lending has always been the core of commercial banking business: Banks collect short-term deposits and extend long-term loans to retail customers and companies (maturity intermediation).
Peer-to-peer (P2P) lending platforms were first launched in the early 2000s, initially concentrating on lending among individuals. “Crowdfunding”, the funding of a private project by raising small sums from a large number of people via the Internet can be viewed as collaborative P2P. Crowdfunding has been used to fund various sorts of entrepreneurial ventures, such as artistic projects, including movies, concerts and books, as well as non-profit community-oriented social projects.
Another fintech-based innovation in capital raising is the issuance of tokens rather than shares to finance ICOs (initial coin offerings): offering of tokens instead of shares to finance corporations. It can be noted that the majority of the ICOs were found to be fraudulent.
With lending innovation, alternative new credit models have emerged, including automated loan approvals. These platforms have developed data mining and machine learning techniques for credit scoring using non-traditional data sources (behavioral information, social networks like Facebook…) and powerful data analytics to price risks and lower operating costs.
**C. A WAY TO TRANSFER ECONOMIC RESOURCES THROUGH TIME AND ACROSS GEOGRAPHIC REGIONS AND INDUSTRIES**
This third core function “A way to transfer economic resources through time and across geographic regions and industries” relates to the production of financial products to retail investors.
Current liquidity can be transferred to the future via bank savings accounts, or by investment in stocks and bonds. Individuals can also transfer wealth from the future to the present by borrowing for various maturities. For centuries, commercial banks, have provided basic financial products to fulfill this function, which is one of the banks’ core businesses. For their part, commercial banks offer time intermediation by collecting short-term deposits and investing them in longer-term loans. Investment banks, on the other hand, specialize in trading securities and offer portfolio management and advisory services as to how to move resources to the future through securities investments.
P2P in this area allows small individual depositors to finance large-scale loans (Lending Club, Kabbage, SoFi…). Once the loan is originated, the credit platform acts as an agent for the investors by servicing the loan. Investors have the flexibility to invest 100% of their capital in one loan, or diversify and make partial investments in multiple loans. P2P platforms have set up systems of loan selection where investors specify criteria for the loans they want to purchase. These systems then filter out these loans for the investor. P2P platforms generate revenue from origination fees charged to the borrowers, servicing the loans, as well as additional charges such as late fees.
Neobanks are playing a growing role in this area. Neobanks are pure digital institutions with two big cost advantages relative to traditional banks: the absence of branches and their up-to-date cloud-based software. In partnership with Visa and Mastercard the neobanks also offer credit and debit cards, with no fee even when used internationally.
These neobanks have the common characteristic that they don’t make money yet. Still there is uncertainty on the future of these neobanks as they need to convince clients that they are financially solid and will remain solvent.
In asset management, fintech providers, including “robo-advisors”, offer an interface for retail investors to trade and invest either directly or through financial intermediaries. Robo-advisors are progressively replacing human financial advisors, since the automated services are less expensive than traditional financial advisory services. Robo-advisors are computer programs that generate investment advice based on customer data. Through the use of machine learning (ML) techniques, robo-advisors offer a less costly alternative to human financial advisors, particularly for individual retail investors pursuing passive investment strategies. The cost of entry is also much lower.
**D. A WAY TO MANAGE UNCERTAINTY AND CONTROL RISK**
The fourth function of financial intermediaries according to Merton is “a way to manage uncertainty and control risk”.
Leading risk softwares in the 90s are: Riskmetrics (JP Morgan), Creditmetrics (JP Morgan), KMV (Moody’s), Kamakura, Algorithmics (Fitch, IBM, SS&C). They can be viewed as the fintech response to Basel II regulatory demands.
An important innovation in bank capital regulation emerged as a response to the GFC. Following the GFC the Fed in the US and the EBA in Europe imposed on banks to run stress tests with the purpose of ensuring that banks have sufficient capital to absorb losses under a financial downturn, while maintaining sufficient capital to keep making loans. The pandemic highlighted the need of stress tests in controlling risks in the financial markets. Fintechs are now offering banks solutions related to stress testing and the generation of scenarios.
A key industry in which technology is in the process of revolutionizing traditional financial intermediation is insurance. Insurtechs are reinventing the insurance business through the use of new digital technologies. For example, the pricing of insurance contracts relies heavily on ML techniques, and not only on traditional approaches where clients are placed in broad categories such as age, gender, etc.
Smart contracts may radically change existing contracts, such as car insurance contracts. With a smart contract, the car insurance is embedded in the vehicle and data generated by the driver’s use of it is fed continuously to the insurance contract. The terms of the contract can then be adjusted according to the transmitted data. This development is underway as insurance companies propose usage-based insurance policies, known as “pay-as-you-drive”. Smart contracts will facilitate more accurate pricing of these policies.
The new technologies change the risk landscape and introduce new risks such as cyber-risk. Risk managers now consider cyber-risk as the biggest threat to the business of their enterprise. Fintech companies are emerging to help various organizations around the world to automatically 24/7 test their cybersecurity measures and identify their main risks and the most cost effective
way to protect their organization against hackers.
E. PRICE INFORMATION THAT HELPS COORDINATE DECENTRALIZED DECISION-MAKING IN VARIOUS SECTORS OF THE ECONOMY
The fifth function of financial intermediaries according to Merton is providing “price information that helps coordinate decentralized decision-making in various sectors of the economy”. This function relates to processes and technologies that contribute to the efficient allocation of resources in the economy.
Major contributors to the information processing are:
- Robo-advisors,
- Algorithmic trading or Algo-trading: algorithmic trading encompasses a wide variety of trading and portfolio management strategies, such as Quant Funds, financial products such as Exchanged Traded Funds (ETFs) and High Frequency Trading (HFT).
- Personal Financial Management (PFM) emerged with Open Banking
F. A WAY TO DEAL WITH ASYMMETRIC-INFORMATION AND INCENTIVE PROBLEMS WHEN ONE PARTY TO A FINANCIAL TRANSACTION HAS INFORMATION THAT THE OTHER PARTY DOES NOT.
The sixth function of financial intermediaries according to Merton is providing “a way to deal with the asymmetric-information and incentive problems when one party to a financial transaction has information that the other party does not”.
In this area we should note the critical contribution of:
- Artificial intelligence (AI) which describes algorithms in decision-making that can perform functions typically associated with human intelligence. This includes understanding speech, pattern recognition, reasoning, knowledge representation, planning, machine learning, analysis of social interactions, etc.
- Data intelligence systems which are the major source of information on any aspect of life today is the Internet. The major task is to unveil the information, verify its validity, and analyze its economic implications.
- Smart contracts.
CONCLUDING COMMENTS
In our paper, we follow Merton’s functional approach to analyze the impact of fintechs on financial intermediation. This approach is the most appropriate since the six basic functions outlined by Merton are independent of the structure of the financial system.
The functions can be fully integrated, as is the case with universal banking, or can be unbundled and fragmented, allowing for the delivery of at least some financial services by non-bank fintechs. Many fintechs started as niche players developing a specific service, but have since transitioned from product-centric to customer-centric enterprises. They use data as an extremely important factor of production and lever it to provide more diverse customer services. An example among many others is Oscar, a young health insurance company, which is evolving into an enterprise offering extensive online health care monitoring and advice. This trend is expected to expand in the future.
Are fintechs going to replace the banks and insurance companies? The most probable answer is no. Banks maintain several important advantages over fintechs. First, they have the reputation and trust of many loyal customers. Second, banks have equity capital, generally in excess to what they need. Third, banks operate under a regulatory umbrella and enjoy government support. This was made evident during the 2008 financial crisis, when the Federal Reserve in the U.S. and other central banks intervened to help the banks overcome the crisis. Banks exploit these advantages, and they acquire directly, or through related companies, many of the emerging fintechs to enhance banking services. Very often traditional financial intermediaries supply the third-tier capital (in the form of long-term loans) to non-bank lending platforms. Since banks can cross-sell many financial products on their platform, we can expect a combination of many niche firms and large banks. Since banks are also heavily regulated and slow in making changes, it can explain how small outsiders can still survive.
It can be expected that in the future, new regulation will encompass fintechs in such a way that any financial service offered on any platform will be subject to the same regulation. The position taken by commercial banks is that regulation should follow the principle of “same product – same regulation”, in order for banks not to suffer adverse discrimination and to ensure a “level playing field”. In principle, regulation should be based on functions, and not on tools. As we have seen in the past, regulation has a major impact on the competitive structure of the financial intermediation industry. The presence of fintechs forces regulators to rethink how to structure the financial services industry to enhance consumer protection and stability without impairing either innovation or competition.
Banks continue to adopt automation at a fast pace, and offer a growing number of online digital services. As a result, many banks close branches, shrinking the size of departments engaged in advising clients, approving loans and providing other services. Some major financial institutions have acquired online brokerage and robo-advisory fintechs, and now offer these automated services internally. Only relatively few fintechs enjoy IP protection, hence their services can be duplicated by incumbent banks and insurance companies which have large research and IT departments.
It is expected that some fintechs, those not acquired by traditional financial institutions, will likely undertake horizontal mergers and acquisitions to become multi-faceted service companies.
In the spirit of Merton’s conclusion “the functional perspective emphasizes the discovery of more efficient ways to perform one or more of the six basic functions of the financial system”, the evidence is clear that fintechs are reimagining these services and making their delivery more efficient, at times reaching market segments that have been ignored by incumbent financial intermediaries.
Sandrine UNGARI
Sandrine is currently head of the quantitative cross-asset research team at Société Générale. Within the Cross-Asset Research group, the quantitative research team is active in risk premium strategies, derivatives and structured products, portfolio risk modeling, and provides research to investors worldwide. The group has been recognized as a market leader in quantitative research and was ranked No. 1 in the Extel survey in the Quantitative Strategies category. Sandrine joined Société Générale in 2006. Previously, she worked as a quantitative analyst at HBOS Treasury and Reech Sungard in London. She graduated from ENSTA (Paris) and holds a Master’s degree in Quantitative Finance from the University of Paris VI. She is a lecturer at the University Paris Diderot.
Nicole EL KAROUI
Nicole is Professor Emeritus at Sorbonne University (Paris VI), after having been a professor at the École Polytechnique for ten years. A specialist in stochastic control, she has used her ideas in financial markets, contributing to the emergence of the international field of «financial mathematics». École Polytechnique gave her the opportunity to create a research team in this field, with an international reputation. Her current research concerns the risk of longevity seen from the perspective of population dynamics and dynamic utility. Very concerned about the question of transmission to youth, she created in 1990 in Paris VI, the DEA (Master of Probability and Finance), the first in a scientific university. Through this training, she became known in financial markets around the world, even making the front page of the Wall Street Journal in 2006. French «quants» are highly sought-after in investment banks. Following the creation of the «Financial Risks» chair by Société Générale, she is actively working on the creation of the Risk Foundation in 2007 and at the Institut Louis Bachelier, convinced that this structuring of ties between academics and professionals represents a very important asset for France.
Charles-Albert LEHALLE
Responsible for data analysis at Capital Fund Management (CFM, Paris) and Visiting Scholar at Imperial College (London), Charles Albert studied Machine-Learning for Stochastic Control during his PhD, 20 years ago. He started his career as IA Project Manager at the Renault research center and joined the financial community in 2005 with the advent of automated trading. In 2016, Charles Albert was awarded the prize for the best article in finance by the Institut Europlace de Finance (IEF) and published more than fifty academic articles and book chapters. He is co-author of the book «Market Microstructure in Practice» (World Scientific Publisher, 2nd edition 2018), analysing the main characteristic of today’s markets. He is the Scientific Director of the interdisciplinary research programme «Finance and Insurance Reloaded» at Institute Louis Bachelier. This program explores the influence of new technologies (from the artificial intelligence blockchain) on the banking/financial/ insurance industry.
ROUND TABLES DEEP LEARNING VS. THEORY: ILLUSTRATION WITH DEEP HEDGING
Among the FaIR’s round tables, this chapter will focus on a very interesting discussion that happened during the Deep Hedging round table. The focus of this round table is on the use of data implied by artificial intelligence in the financial system as well as the resulting challenges.
Over the past couple decades, artificial intelligence, as a technological innovation, has lead to an important number of transformations in the financial landscape. Some transformations are still ongoing and some new opportunities will most likely come in the next couple of years. This is intrinsically linked to the availability of large amounts of data. For a number of reasons, including bias reduction and liability of automated algorithms, the data cannot just be fed to deep learning models making predictions; some level of explicability is desired.
In this first excerpt, Sandrine Ungari (SG) presents her view on how Deep Learning tools can be used for products valuation and risk assessments. She also stresses important challenges that might have limited deep learning adoption in the financial sector.
19/12/2019,
AFGAP,
ORGANIZED BY FaIR
Recently, more and more researchers have been trying to apply these approaches to the valuation and risk analysis of derivatives.
Using deep-learning for the valuation of derivatives is not a new idea. The first paper on the subject was published in 1994 in *The Journal of Finance* by J.M. Hutchinson, A.W. Lo and T.A. Poggio (*A Nonparametric Approach to Pricing and Hedging Derivative Securities Via Learning Networks*). The authors developed the idea of using a neural approach to value derivative contracts.
This approach was not pursued at the time. It is back in the spotlight today, thanks to advances in optimization and the computing power of modern computers. In a classical approach, the model takes a series of parameters as inputs: the underlying price, strike, maturity, rates, implied volatility. A formula is applied, such as the Black Scholes formula for instance, and a price is obtained.
**Graph 8. Valuation of derivatives in a classical model**
- **Stock price**
- **Expiry**
- **Strike**
- **Rates**
- **Implied volatility**
**Black & Scholes pricer**
**Model price**
Source: SG Cross Asset Quant Research
With neural networks, we take a maximum of input, and historical or simulated data. So the network is calibrated to minimize the gap between prices coming out of the network and market prices. The model is non-parametric and is the result of a calibration.
**Graph 9. Valuation of derivatives with a neural network**
- **Stock price**
- **Expiry**
- **Strike**
- **Rates**
- **Implied volatility**
- **Realized vol**
- **Other inputs**
**Trained neural network**
**Market quoted price**
Source: SG Cross Asset Quant Research
Deep hedging uses the same idea. It is an approach that was developed and proposed by a group of researchers at ETH Zurich and JP Morgan (*Deep Hedging*, the *Journal of Quantitative Finance*, Jan 2019, Hans Bühlert, Lukas Gonon, Josef Teichmann, Ben Wood).
This approach simulates a lot of market data and optimizes the hedging strategy. Rather than calibrating the network on the price of an instrument, we calibrate the network in such a way that we minimize the portfolio variance containing the hedge instruments and let the network set the optimal hedging strategy.
**Graph 10: Hedging risk management with deep pricing**
- **Market simulators:**
- Risk neutral dynamics
- Historical dynamics
- Rare events
- **Portfolio of derivatives:**
- Cost of trading
- Liquidity constraints
- Capital requirement
**Neural network that maximizes the expected return of the portfolio + hedging strategy, while minimizing its risk**
**Optimal hedging strategy**
Source: SG Cross Asset Quant Research
The theory and approach behind the concept is much more complicated. For the time being, this type of technique is primarily based on simulations. The available market data is not enough to calibrate neural networks. Artificial data must therefore be generated. There is a whole branch of research, popular at the present time, which consists of studying how to simulate realistic data, and which is consistent with the reality of financial markets.
The challenges of deep learning: the last issue that I wanted to address is the constraints and challenges of this type of approach. In the study published by the FCA and the Bank of England, several questions emerge about the implementation of these techniques.
So the first question is the management of historically used systems. This is not a problem specific to deep learning, but one that arises as soon as one seeks to do something new in an industry such as banking or insurance. Switching from an old system to more modern technologies is always complicated to handle. More particularly in Machine Learning (ML), there is the integration of these techniques into the processes used to run the business. This issue is related to the training needed to get users to apply these new techniques. Users must be familiar with the concepts discussed at the beginning of this presentation. This is quite a cultural change that needs to be made within organizations. Another point that is often cited is the lack of explainability. This is a major problem with the deep learning approach. In a non-parametric approach, one cannot change a parameter and see how the result of the model is impacted. There is a lack of intuition on how the model reacts and on the origin of the results. For example, Deep Mind has created an algorithm capable of playing Go, called AlphaGo. In the game where AlphaGo first beat a professional Go player, the computer came up with a move that no one understood or could explain at the time. In retrospect, it was a stroke of genius.
**Graph 11. Constraints and challenges of Machine Learning in practice**
Source: Machine Learning in UK Financial Services – Bank of England, FCA
With deep learning, you can have completely unexpected results. As an investor, a trader or a risk manager, you don’t know if it’s a stroke of genius, or just a numerical problem. In practice, this kind of behavior can become troublesome. Insufficient data is also a theme that is regularly mentioned. Machine Learning is a data thirsty approach. We only have about ten years of data on most financial markets. This can be a problem in the implementation of this kind of algorithm.
Related to this, other questions arise regarding the use of alternative data: how should the use of personal data be regulated? What are the governance processes for data, how is it managed? How do we ensure its reliability? How do we ensure that data is reliable? That’s a good question. You can’t have an 100% guarantee that the data is reliable. On the other hand, we can set up checks to get the best possible representation of reality. For instance, if we take trading data, we can observe the prices being traded, and we have to make sure that there are no errors in the databases.
So here is a brief introduction to machine learning, deep learning, and deep hedging, which already raises many questions.
The specific case of Deep Hedging is especially relevant as one of the most direct application of deep learning in finance. In financial intermediation, replication strategies have always been an important determinant of risk sharing among financial actors. There are however a few technical considerations that should be taken into account when applying deep learning to hedging strategy replications. In the following excerpt from the Deep Hedging round table, Charles-Albert Lehalle proposes a general presentation of the so-called Deep Hedging technique as well as the main challenges of using deep models for hedging. In particular, he explains how being able to reason in the risk neutral world is fundamental for hedging strategies, and also that a deep model will only minimize the mean error whereas a traditional model can minimize the local error. This tends to show that research is still needed in order to better leverage the use of deep learning models in hedging.
**Charles-Albert LEHALLE**
It is time to discuss the case of deep hedging. Deep hedging is a way to develop strategies for replicating the risk of an uncertain position that is based on reinforcement learning. Let’s review the principle of risk replication. If I have a position that has non-linear exposures to stochastic processes, i.e., uncertain dynamics of economic variables such as volatility, prices, rates or correlations, how much should I buy or sell each day of tradable products in order to reduce this exposure? At the end of the day, when the hedged portfolio matures, if my strategy is well designed, I have exactly the amount to be delivered to my client, or I am short of the amount they are going to pay me. These replication strategies are very important for investment banks because not only do they reduce exposure to economic risks, but they also provide an estimate of the average cost of hedging over the product lifespan, and therefore allow them to price it.
In a «traditional» hedging technique, price dynamics are estimated on the basis of implicit variables.
If we consider the operating principle of «traditional» hedging, price dynamics are simulated using implicit variables. Several trajectories are generated and the combinatorics of a very large part of the possible hedging strategies are explored and compared with the simulations. Only the most efficient strategies are selected and form the trajectory components of the so-called optimal strategy. It should be noted that the implicit process amounts to not using a historical database of market prices of negotiable instruments, but to using solely the current prices of derivatives, i.e., products of the same nature as the hedged product, which also leads to the hedging strategies’ implementation. It is argued that we are not using the historical measure, which is the database measure that would be used by a learning algorithm, but the risk-neutral measure.
This measure has many attractive properties. The one I prefer is that it guarantees that if, during the lifespan of the replicated product, there are other products of the same nature available for purchase or sale, then the bank will be able to «resell its risk» and will no longer have any exposure of any kind. The price that will have been calculated in this manner at the beginning of the product’s life will be quite fair. This would be less the case under historical probability. By using this risk neutral measurement to generate trajectories to evaluate the performance of hedging strategies, the bank therefore perfectly fulfills its role as a financial intermediary. It places itself temporarily between several buyers and sellers of different risks and does not take «historical risk», as an investment fund might do.
With a deep neural network, one can generate fewer replication strategies, to focus on those that seem to work better. Once we understand this principle of generating trajectories in order to evaluate the performance of potential strategies, we can use learning techniques to improve it in a preliminary way. When
we systematically cover almost all possible replication strategies, it is very costly from a computer point of view, especially when we increase the problem’s dimension, i.e. when we want to cover portfolios with many assets and many nonlinearities. With a «deep neural network», one can generate fewer replication strategies, trusting the neural network parameters to quickly focus on those that seem to work better, and thus converge more quickly towards the optimal strategy, or at least that seems optimal. Sufficient comparisons have already been made by academics to convince us that it is indeed more economical in computing time and memory.
Traditional methods guarantee a maximum «local» error, whereas neural networks only guarantee an «average» error.
Obviously, once we realize this, we only want to increase the size of the problem to handle cases that are simply impossible to handle with traditional methods. Indeed, it is possible. But this raises the question, since we no longer have any elements of comparison, and since we are on a large scale, of verifying that these strategies are indeed valid. Indeed it must be understood that traditional methods today guarantee a maximum «local» error, in the sense that the error is controlled in the same way everywhere, whereas neural networks only guarantee an error «on average». For a measured level of error it is not known if the neural network makes an error of this order of magnitude everywhere or if it makes very large errors in some places and very small ones in others. And in large dimensions, we know that what is called the «curse of large dimensions» is very much misleading the calculations «on average». This implies that a method has yet to be developed that translates this «average» guarantee into a «nearly everywhere» guarantee. There are leads but nothing conclusive to my knowledge. The next step, if one is comfortable with using learning methods to develop hedging strategies, is to use similar methods to generate trajectories from data, rather than making simulations from modelled processes whose parameters are implied under risk-neutral measurement. And that’s still a very big change. On the one hand we can say that this is an opportunity to get closer to reality, notably by taking into account self-correlations in a non-parametric way, but on the other hand we must avoid leaving the attractive properties of the neutral risk world. Some researchers are working on this subject but it is complex. Indeed, no one wants hedging strategies to be influenced by six recent months of bull markets; it is only a matter of time before the market becomes more stable. It is not up to intermediaries, such as investment banks, to take these kinds of bets, these kinds of risks, which are typically investment fund risks.
The success of this type of project depends on a small team of experts working together with business experts on well-defined projects.
I will summarize some key aspects for me. First of all, implementing a secondary innovation coming from AI is not simple, it requires effort and investment. The right way to foster the success of this kind of project is to have a small team of experts working together, for a short period of time, with business experts on well-defined projects. Always keep in mind that a learning algorithm is made up of three things that all three need to be tracked: external computer libraries, internal code and databases. This creates a certain complexity in versioning, deployment and monitoring. Another very important aspect comes from the data bias. We should not believe that because it is not necessary to write equations to implement learning algorithms, we do not make model choices. The choice of model is hidden in the data, and in the way the algorithm will do its best to adapt to the data. It is necessary to keep a critical, modeler’s eye on the data. And when it comes to deep hedging, you have to remember all these points, and especially that of bias. We do not want a replication strategy to be influenced by recent sporadic specificities in price dynamics of tradable products. This raises some interesting issues for researchers in financial mathematics. Some of them are already tackling them, and I am convinced that they will provide answers. These will certainly not be that we should close our eyes and «trust the data».
As Sandrine Ungari pointed out, the lack of explicability can be an issue at the individual level (bad risk assessments) but also at the macro level (systemic related issues). This is especially relevant for risk evaluation as Charles-Albert Lehalle pointed it out regarding Deep Hedging. For these reasons, the regulator might need to intervene to prevent bias in order to ultimately protect investors. However, as it tends to be forgotten, bias in decisions is also an important issue in the human world. So bias should be supervised within automated algorithms but also within human-based decisions. This is essentially the point of the following discussion that Charles-Albert Lehalle had in the Deep Hedging round table.
Charles-Albert LEHALLE
The novelty of the approaches we are talking about today, deep learning methods, lies not only in their profoundly non-linear nature, which seems to be able to adapt to a wide range of relationships between variables that are not perfectly known, but it also stems from the fact that the data they gather have a great influence on the results obtained. The implementation of a learning algorithm requires:
- External code libraries, often provided by Google, for example with TensorFlow, or Facebook, with pyTorch,
- Code developed for the application, which specifies for instance the criterion to be minimized, the choice of the optimization technique and its parameters. A database that will serve as a reference for the algorithm.
How to protect the result from a possible bias in data or even from data manipulation that will change the algorithm outcome?
A range of questions can be asked regarding the level of quality that should be required on the data. How to protect the result from a possible bias in the data or even from data manipulation that will change the outcome of the algorithm? There is the subject of cyber security of course, which is more of an industrial issue. How to secure access to the multiple interfaces that result from the use of distributed components? One can think of the cyber attack on the Mexican central bank’s payment systems in May 2018. Will this type of attack be facilitated when market participants use algorithms that connect several times with many more intermediaries?
But that’s not the topic for today. Let’s focus on the specific issues related to the implementation of AI technologies. Difficulties can come from several factors: External libraries: how to reliably measure the impact of a change of version of one of the big learning libraries, such as TensorFlow or pyTorch? You need to be able to restart learning with the new version, on the same data as used with the older version, and to compare the «results». What exactly are the results? The parameters resulting from the training (i.e. the «mass» of the neural networks)? Or the predictions obtained by these neural networks? Probably both. But learning’s random nature, because let’s not forget that most of these methods rely on stochastic gradient descent, renders this comparison difficult.
- The data itself can change and be updated, when there is an inaccuracy, or we can simply increase the volume of this data. In this case, it is then necessary to start learning again and compare the results once again, using statistical criteria. It is necessary to check that the results are not «statistically different».
- Even before talking about a data change, one must consider the possible influence of «bias» in data. The classic example is that of a gender bias: if the learning base is not balanced, then the results will not be balanced either. If we think about loans’ allocation, an algorithm should not be more willing to lend to men than to women, for instance. In market finance there are many other drawbacks, including the very important «contributed data» drawback, that I will talk about later.
Obviously, the code that implements the specific functionality of an application, very often developed internally by the financial institution, and which includes a criterion to be optimized, called in statistical learning the «loss function», has a central place. It plays a very important role in the learning outcome. Which function should we choose? Particularly, is it better to choose a statistical precision criterion, or an «operational criterion», i.e. for example a gain in euros? Should a penalty be assigned to risk-taking, and how should it be combined with the gain criterion? The insurance and market finance industries are especially regulated, and rightly so, since they can have very strong negative externalities.
It is therefore necessary to find a clear framework for the use of these technologies.
Once we start thinking about the regulation of AI technologies, and to avoid embarking on the subject, which is a bit of a cliché of «algorithm ethics», it is worth taking a step back.
Why demand to control the bias of an algorithm when we do not demand control over the bias of decisions of the same nature, but made by humans.
On a personal note, I remember the debates around high-frequency trading, to which I contributed a lot. The debate was not much different from today, since high-frequency trading uses automatic trading algorithms that are calibrated with data and have relative autonomy. Once again, I have the feeling that posing the problem in an automated and technological framework has the virtue of bringing out real issues. When you study a process that involves a lot of human decisions, you can always think: «since there are humans in the loop, the description we make here is a bit approximate and never exactly respected, so we’re not going to think too much about its implications». When we are faced with machine-driven processes, we ask ourselves the real questions in a much clearer and more concise way. We must therefore take advantage of this to regulate better. To regulate machines well, of course, but also to regulate humans better. What struck me in the debate on high-frequency trading is that at one point there were decisions of this type: «let’s regulate machines and essentially machines». But no, the way in which humans, as intermediaries, made prices on certain illiquid products was obviously to be regulated as much as the way in which machines make prices in a systematic way, even if it is often on more liquid products.
To return to biases, we also need to supervise biases that come from human decisions
It is necessary to organize «decision making reviews», which, based on statistical criteria, will make it possible to establish whether the decisions made last month by the institution were biased, and if so, it will have to justify why. And if it is not justified, the institution will have to demonstrate that it is taking measures to prevent this from happening again. Whether these decisions are made by machines or by humans. So I’m taking a chance that automation and the use of AI technologies allow us to ask these questions. And I hope that the conclusions that will emerge from the debates will allow us to give life to regulations that will apply to processes managed by humans as well as by machines. And that’s really a strength, even if it raises several problems, but I think they will be better addressed.
With the previous discussion it is clearer that artificial intelligence in risk intermediation has already proven very useful, although there are a lot of technical and regulatory challenges. However, it should be kept in mind that artificial intelligence is a generic technology. The true application of this generic technology will have to be driven by secondary innovations. More practical use cases may be created by the interaction between experts in the technology and experts in a narrow field for which the generic technology might be applied to. This is the general idea of the next excerpt from the Deep Hedging round table presented by Charles-Albert Lehalle.
Charles-Albert LEHALLE
Once the debate has been framed in terms of financial services’ disintermediation, we may question the nature of what we want to call «Artificial Intelligence technologies», even if we can debate for hours about whether we should really call them that. I have to admit that everyone is using this term today, so I’m going to use it too. What is the particularity of AI when it comes to implementing it? I think it’s because it belongs to what some economists call Generic Technologies.
I’ll give you other examples of Generic Technologies: steam engine and electricity. Just because you’ve used a steam engine to drive a locomotive doesn’t mean that it’s easy to use a steam engine to run a loom. You have to redevelop what are called secondary innovations. Artificial intelligence works the same way. It may work very well on signal processing to recognize images or sound, but if you want to use it in a bank you have to redesign a lot of things, and readapt AI to each set of problems. This requires investment. Therefore the ecosystem needs to organize itself, in order to put in contact generic experts of this technology, and specific experts, during specific small short-term projects, to be able to manufacture secondary innovations that will respond to a particular industry or company.
The deployment of AI in banking and insurance cannot be done without investment and will require many secondary innovations.
The distinction between secondary innovations and generic technology, and especially the fact that investment is required to produce secondary innovations, creates a complicated bias. Since, on the one hand, I can read every day in the newspaper that AI is great, that it works for lots of applications. Yet, on the other hand, when I want to apply it without investing time and money, in a well thought out project, it doesn’t work on the problems I’m interested in. Today’s Villani report has made this clear, and it means that there will soon be areas of excellence in France, the interdisciplinary institutes of artificial intelligence (3IA), that will bring together generic experts in AI, big data, data sciences and specific needs, with their business experts. Typically in the Paris region, one of these 3IAs is called PRARIE. Companies will be able to make partnerships, with periods of one to three years, to try to manufacture secondary innovations. The major English universities have done this with the Turing Institute, which was created in 2015, and it seems to be working well. In the United States, each major American university has created a «small» center of this nature, such as the Center for Data Sciences at NYU, created in 2013 by Yann LeCun.
University centers of excellence are set up in France to bring together generic AI experts and business experts.
Before getting to the core subject, I wanted to stress the need to invest, no doubt in collaboration with academics, in order to obtain the secondary innovations needed to make AI work well in market finance.
In the last round table excerpt for this chapter Nicole El Karoui presents a really interesting retrospective of innovation in financial mathematics in the last 30 years. The main point is that big trends in financial intermediation, like the derivative products boom, are generally due to important technological changes. In a way similar to how financial mathematics reshaped the financial landscape and our view of it, current breakthroughs in deep learning (from computer science this time) have the potential to drastically change our approach of risk intermediation.
Nicole EL KAROUI
You could say that I have been a kind of « companion on the road » on « financial risk » markets, particularly on the issues of derivatives’ hedging and the emergence of their regulation (not to mention crises) over the last thirty years. Surprisingly, it seems to me that there is a certain interest in confronting the current evolutions resulting from Big Data and its extraordinary technological tools with those of finance in the 1980s. When the futures markets (MATIF and MONEP) opened in France in 1985-86, ten years after the United States, we were in the midst of a computer revolution, corresponding to the switch from IBM mainframes to PCs. French banks took advantage of this to set up their derivatives business in a very quantitative way, notably at the Société Générale. Engineers were developing the business, focusing primarily on the possibilities offered by IT.
At the same time, at the Faculty of Science and the Ecole des Ponts et Chaussées, and later in other universities and « Grandes Ecoles », very quantitative financial mathematics courses were being set up, most of them led by women (a French exception in this highly technological world). The rapid growth of computer power (Moore’s law) allowed the development of numerical probabilistic methods (Monte Carlo type) which were effective (at the time). From the experimental (start-up type) period of the 1990s, when the question of the meaning and effectiveness of dynamic hedging of derivative products was constantly questioned, we moved on to the « industrial » phase of the years 2000-2008, when financial innovation and market expansion (parallel to that of computers) boomed, despite increased regulation. All media became allowed, credit derivatives, or commodities, without any further consideration of the new risks created, since this was very profitable. The theoretical aspects were very much overlooked.
The rise of derivative products was caused, like learning machine today, by technology
The analogy with the current period concerns technology. As with credit derivatives in finance, everything seems possible and feasible. First of all, it becomes a matter of accelerating calculations and algorithms, on which we think first and foremost of technology and computer problems, and only then of analysis and interpretation. As Sandrine has pointed out, the modeller’s knowledge and market intuition is no longer central to the validation process.
This reflects the 1960s, when French statisticians surrounding Benzécri were among the pioneers in developing data analysis, also known as principal component analysis etc. The idea was to geometrically represent data, and to project it on the most significant axes. One of the major innovations was to display the graphical representation of the data in the new axes. The data was no longer a statistical model, and spoke for itself. Such graphs could be found, for example, in non-specialized journals such as the « Nouvel Observateur ». But this speech could be very difficult to interpret and validate, especially in medicine when confronted with « mixes » of explanatory factors. Its simplicity made it beautiful but ended up limiting its use. This question is connected with current concerns about interpretability, even if today the data dimensions are infinitely more numerous.
Having a large amount of data does not eliminate uncertainty
Another bias is linked to the myth that a large number of data limits uncertainty by providing « probabilistic » information. However, this is clearly wrong if the data is not independent or stationary, hence the importance of empirical knowledge of the data panel you are working on, in relation to the problem you are trying to solve. For example, what is important in an exchange rate is its drift and trend, whether you are investing and its volatility if you are hedging. It has little to do with it and has a significant influence on the data choice and models to be taken into account.
This bias is less important when referring to physical phenomena, which reproduce themselves in a relatively similar way over time. In the world of banking and insurance, and for much societal data in general, we are confronted with the fact that markets and societies learn quickly. Past data is therefore rarely informative for projections into the future, hence the need for increased vigilance. In fact, all three of us have raised in one form or another the topic of results’ validation. The first phase is empirical, and concerns the consistency of the data produced, the « output »: outliers, comparison with the results of the previous day. The second phase is indissociable from a proper representation of problems, and this issue concerns both the data and the models.
The first thing is to have a good representation of the problems. For example, in market finance, the question of the time scale to be taken into consideration is not as trivial as it may seem. The product maturity may be very distant, but the hedging horizon is a day’s time, regulatory or almost regulatory, not to mention all the intermediate maturities due to regulation. It is not easy to know how to take these elements into account simultaneously in the data vision and the algorithms that will be implemented. This is also the case in the choice of mathematical models, the only difference being that it is theoretically easier to measure the consequences, and to question the initial hypotheses if the results are not appropriate.
Mathematics requires the use of precise terminology, which helps to structure data processing
Another fundamental contribution of mathematics to the applied sciences, prior to any modeling, is the emphasis it places on vocabulary. There can be no exchanges or ambiguity. When I started in finance, there were about ten notions under the name of volatility: market volatility, implicit, local, average, currency, and many other qualifiers that were not specified. Imagine the implications of this for data collection.
Moreover, in the matters that we are concerned about, the questions are the same: for instance what is the data for you, or for me? Raw data, re-processed, of large dimensions (which one?), reproducible, original, generated by bank algorithms, bought, sold, personal, retrieved on the web, stored on the Cloud, in your computer, obsolete, historical, etc. We are quickly getting close to a « Prevert-style » inventory. With my banking culture, I’m tempted to associate notions of risk and so this inventory is endless.
In the thirty years that I have observed (as an academic) the world of banking and insurance, whose risk is by definition time-dependent, I have never seen a sometimes weak culture of signals being put in place to warn us on possible breakdowns. This should be a necessary culture in an uncertain world, whether or not bottom-up vigilance is required. This implies increasing the diversity of views, points of view, but also training. It must be stated that although my job as an applied mathematician is to decipher the fundamentally dynamic and uncertain
worlds that I study in a new light (financial markets, regulation, life insurance and longevity), I find that the paths are often blurred, and that I sometimes find it difficult to find my way around, even if the challenge is often exciting. I’ll explain myself a little better, by taking an academic example. The first time I saw that to draw numbers in a perfectly random way between 0 and 1, we used a deterministic algorithm, I was more than surprised, stunned, you could say. This is the algorithm behind the random key on your computer. It’s the basis of all the simulations we talked about. So there is no randomness and I had a «real soft spot» for randomness...
I was «reassured» when I discovered that Google’s algorithm for finding the best page (containing a given word) consists in randomly disrupting the system to prevent it from getting trapped in a non-optimal « pit ». «Phew», I could still consider «my» probabilities to be great...
But the world is becoming very intertwined; it is very difficult to quantify the respective importance of deterministic and random aspects.
This is similar to what we were talking about. We get used to interpreting data in a world where we often don’t know how and who created it. Of course, these are only questions, but they seem important to me in our field. Besides, it is not only about interpretation but also about a form of conditioning. I’ve noticed that I don’t think in the same way in math since I’ve been typing on the screen, compared to when I used to write on paper. All these effects create a Google culture, as you say, Charles-Albert, on research, on the way of seeing, on the vocabulary, which is very conditioning. You have to think about it seriously, so that you don’t lose too much credibility in the way of thinking and evolving in the AI world. For instance regarding the «formatting» of algorithms, when you’re the one who programmed the algorithm, you know what’s inside, you get tired of doing it. You know some of its limits. Yet when you’re going to use «open source» software or one of the algorithms in Python or R, there’s a whole part of it that you no longer control, that you’ve appropriated from the outside, a black box. At a certain level, what does it give you in terms of freedom of thought, for example? Where are the singular spaces to ask yourself the proper questions?
BETTER CONNECTION TO THE REAL ECONOMY
TOWARD A MORE ACCURATE VIEW OF THE FUNDAMENTALS
MORE DATA AND BETTER INFORMATION PROCESSING p.86
FAIR NETWORK CONTRIBUTORS p.87
AIMÉ LACHAPELLE p.87
CHRISTIAN ROBERT p.87
FAIR NETWORK CONTRIBUTION p.88
RESPONSIBLE AI IN FINANCE AND INSURANCE: SHIFTING FROM CONCEPT TO ACTION p.88
NEW DATA AND PROCESS IMPROVEMENTS IN THE INSURANCE INDUSTRY p.92
ROUND TABLE SPEAKERS p.95
CHARLES-ALBERT LEHALLE p.95
HELMAN LE PAS DE SÉCHEVAL p.95
OUSSEMA CHEIRIF p.95
BRUNO DUMAS p.96
ANNE-SOPHIE TAILLANDIER p.96
STEPHANE HERBIN p.96
ALAIN TROUVÉ p.97
NICOLAS VAYATIS p.97
ROUND TABLES: EXCERPT 1, 2, 3, 4 ALTERNATIVE DATA: TOWARDS NEW CORPORATION GOVERNANCE AND PRICE FORMATION PARADIGM ? p.98
ROUND TABLES: EXCERPT 5, 6, 7 ARTIFICIAL INTELLIGENCE, MATHEMATICS AND INDUSTRY p.102
MORE DATA AND BETTER INFORMATION PROCESSING
The digitalisation of the world has important consequences in terms of data production. Not only more and more data are being produced, but also new types of data are now publicly available. This creates great challenges in terms of data analysis but also considerable opportunities for many actors in the finance and insurance sector. Historically, the finance industry has relied on a number of data sources. First, asset valuation and risk assessment was performed with financial statements and other financial data that the companies would provide to the market. Second, actors in the financial infrastructure, like exchanges and settlement houses, would also provide some very insightful data like market prices but also volumes, order-book related data and other post-trade data for derivative products. Third, national agencies would be in charge of providing aggregate data about the underlying economy. Those data sources have been used for decades in the finance industry.
In addition, there are now quite a lot of other data, coming from different sources, which are usually labelled as alternative data. Such data may include but are not limited to: satellite images, geolocation data, job posting, tweets, social network activity, or textual content in general.
Since the recent technological boom of artificial intelligence, algorithms such as Image Processing Neural Network or Natural Language Processing algorithms are now increasingly more efficient at extracting complex patterns within those alternative data.
The goal is essentially to make predictions from those new patterns. The finance industry may use alternative data to front-run the release of companies’ financial statements, or agencies aggregate economic data like jobless claims or even national growth data for instance. The insurance industry may use alternative data to better estimate the damages of natural disasters or use sensors and detectors to better estimate the probability of a car accident or other disasters. All of this is referred to as Nowcasting which is the idea of better predicting the present before the release of official reports which can take from days to months to be publicly available. In other words, powerful data analysis tools, like machine learning, can be used to have a better, more accurate, representation of the underlying economy.
However, with those opportunities come some important challenges. On the one hand, a general concern with machine learning algorithms is their lack of explainability. As those algorithms heavily rely on data and lack explainability, it can be quite challenging to detect a bias in the learning process which could have important consequences whether it is used for nowcasting or other purposes. Building a safe environment for learning and executing machine learning algorithms is therefore an important objective, but this is highly non-trivial. On the other hand, there is also an important education challenge. In fact, running and actually writing and using complex machine learning algorithms require high computer science skills. But a strong economic intuition is also needed as the goal of those algorithms is to learn more about the underlying economic fundamentals. The link between them would usually have to be operated by mathematicians with high level understanding of the machine learning models (without necessarily the implementation details). This can be quite a challenge for teams that try to build and create a better understanding of the economy from data. As the hype surrounding data analysis is unlikely to stop, financial education programs are likely to evolve which has the potential to transform the financial and insurance industry in the long run.
The remaining of this chapter is organised as follows. First, Aimé Lachapelle, managing director at Emerton Data, presents his view on responsible AI in finance and insurance. Second, Christian Robert from the University of Paris-Dauphine explores improvements to the insurance industry made thanks to the use of new data. Lastly, a discussion based on excerpts from FaIR’s round tables explores more the relation between alternative data, artificial intelligence and the finance and insurance landscape.
RESPONSIBLE AI IN FINANCE AND INSURANCE: SHIFTING FROM CONCEPT TO ACTION
Aimé LACHAPELLE,
Co-founder and Managing Partner of Emerton Data
THE POTENTIAL OF AI
Following the lifting, in the 2000s, of technological locks (GPU computing power) and information accessibility (Imagenet database), Artificial Intelligence technologies have considerably penetrated our daily lives.
If anybody is going to push prospective thinking to the theory of singularity – comparable to completely autonomous AI, it is now a reality that our machines, that always remain parameterized by the human expert, are capable of intelligences close to the cognitive processes usually performed by humans¹.
The advent of such a technology, even in its early stages of maturity, is on paper an unequaled transformational promise for our society and our daily habits.
In the business world, and in particular in the financial services sector, the major transformation is the shift from expert-based to machine-based modeling and decision-making.
IN REALITY, THE THEORETICAL PROMISE IS QUICKLY PUT ON THE BRAKES
However, it must be acknowledged that the massive adoption of AI happened only for very few applications and business cases. Additionally, the many applications of AI already in place, initially in the insurance and banking industries, are in danger and hampered by the fear of impacts and the lack of human control resulting from that shift.
AI today suffers from a lively and powerful deployment, leading to actions that are the result of decision-making processes that humans and professionals no longer fully master. This typically arises for «black box» algorithms, having potentially learned from biased data sets.
In order to remove such a brake on the development of AI, many initiatives and reflections have recently emerged, in particular across Europe institutions and member states, on how to develop a powerful and trustworthy AI.
Still, many questions need to be answered to switch from these various upstream initiatives to reality and action. How do we create proper short-term incentives for organizations to consider Responsible AI? How do we set-up proper governance at organization level?
In the book “The Ethical Algorithm”, Kearns and Roth reflect on the core societal question of keeping control on human role versus machine role. The risks of algorithmic decision-making are very real: should we expect that avoiding these risks will excessively shrink the benefits? What will be the role for law and regulation, in particular in the financial sector, probably a crucial one to help identify what should remain human vs machine? How do we scale since everything cannot remain human assessment?
In the next paragraphs, after quickly reviewing Responsible AI generalities, we deep dive on specific challenges for bankers and insurers, with a concrete illustration in risk modeling regarding the explainability of machine learning algorithms, in the case of multiplicative underlying structures.
A PROPER GOVERNANCE OF AI NEEDS TO BE DESIGNED IN THE FACE OF ITS SPECIFIC APPLICATIONS’ IMPACTS AND RISKS
Among the various frameworks that can be found in the literature, three main pillars stand out regarding Responsible AI:
- Explainability of Artificial Intelligence algorithms and resulting models that need to be understood to a certain extent by various parties, depending on the end goal;
- Bias and fairness of algorithms and models: the resulting discrimination must be steered and controlled;
- Accuracy and robustness: often as a trade-off with the two formers. Most accurate models are indeed usually less explainable and less fair with respect to given sensitive segments (e.g., regarding unemployment or gender in the case of motor insurance risk). On this point it is clear that not all applications will require emphasis on the same topic: if in medicine diagnostics the accuracy is the main focus, it is less clear for credit scoring or risk pricing.
In its whitepaper published on February 2020, the European Commission highlights the ambition to create an “ecosystem of trust” for AI, making the observation that very disparate initiatives are being launched across its member states: Germany’s 5-risk levels framework, Denmark’s Data Ethics Seal, etc. Two outstanding elements from this whitepaper are worth mentioning.
First it is important to understand that setting up the governance of a trustworthy AI must pursue objectives as an extension of very fundamentals ones, of which the cornerstone is to protect fundamental rights, as it has done for years in the absence of AI. To illustrate, human decision making is not immune to bias and discrimination. For many applications, we have developed complex systems – law and appeal process in court, audit and regulation in banks, multiple “lines of defense” in risk management, peer review and collegial decisions in medicine, etc. – to steer and control the human decision making. Then basically the same must be done for AI-based models and decisions, which requires specific approaches and tools to control bias in the data (the “food” of AI), but also to control the discrimination outcome from the AI models.
The second key insight from the EU whitepaper, which gives a taste of forthcoming regulation from the EU, is to drive the governance of AI by the criticality of underlying applications and risks. Showing the wrong advertisement to the wrong customer does not have the same impact as making a medical prescription or as rejecting a credit loan or an insurance policy. Regulation must be adapted depending on the impacts and risks.
FINANCE AND INSURANCE SECTORS FACE SPECIFIC CHALLENGES AND ARE MOVING REGARDING RESPONSIBLE AI
Here we reach the core problematic: most mature AI methods and tools have been developed by the GAFAM ecosystem, mainly on advertisement, media and content applications. Therefore, they poorly address specific challenges of higher risk applications such as healthcare, transport, security or in particular financial services.
Making Responsible AI a reality in finance and insurance, an operational set of processes, methods and tools, relies on 3 challenges that are today very poorly addressed:
- Research should focus on the right topics, for instance fairness Machine Learning approaches have been developed only for classification, leaving aside all regression topics, with metrics such as disparate impact, that unfortunately do not compare discrimination resulting from the scoring to inherent observed discrimination, yet an important comparison for many applications such as insurance pricing or fraud investigation;
- Technological solutions are not ready, e.g. to audit models in terms of explainability and discrimination, to take into account fairness criteria during data preparation and model design, etc.
- Governance is complex because the topic is by its very nature transverse, and because uncomfortable trade-offs between accuracy and fairness or explainability must be achieved. What is the acceptable price to pay to constrain AI algorithms? It has implications from front-office functions (e.g. scoring, pricing) to back-office ones (e.g. risk management).
Many financial services companies are currently approaching the Responsible AI topic.
AXA was one of the first movers on the topic, with the creation of a dedicated R&D team within AXA Rev, its entity dedicated to data & new tech. “A few years ago, we launched a dedicated and substantial R&D effort on explainability and fairness”, says Marcin Detyniecky, Head of R&D and Group Chief Data Scientist. This effort results in several international-class publications. “We are now starting to focus on setting-up the governance and embedding our research work in operational tools to be provided to the various entities of the group”, Detyniecky concludes.
The French bank and insurance supervision, namely the ACPR, has recently led a consultation and working group, resulting in a working document on the “Governance of Artificial Intelligence in finance”, co-authored by Laurent Dupont, Olivier Fliche, and Su Yang. This report presents practical guidelines for companies on the governance of AI and provides valuable insights regarding the governance of AI and its inclusion in the company’s processes, e.g. regarding the integration to business processes, model validation processes, audit procedures, the definition of human-algorithm interaction, and last but not least the compliance with security.
**ILLUSTRATION: EXPLAINABILITY OF AI IN THE FINANCIAL SECTOR**
One of the major takeaways from this work recently performed by the ACPR is the sketch of a framework on explainability of machine learning, and in particular on the effort made on defining explainability expectations with regards to the end goal (the degree of understanding of models expected by a client cannot be the same as the one controlled by internal audit or by model validation teams for instance). The document highlights in particular the need to develop tools for the empirical audit of models.
Following the example of AXA, several large financial services groups have launched specific activities on the explainability of machine learning. JPMorgan Research has recently created a dedicated stream on explainable AI. “The challenges include the ability to explain your AI – what we call “AI explainability.” When AI is used, the regulatory environment requires banks to justify or rationalize decisions. JPMorgan is trying to be the leader in applying explainability to financial markets”, says Apoorv Saxena, global head of AI and machine-learning services for JPMorgan Chase.
To complete the picture, the reinsurance company SCOR is very active on the explainability topic, as confirmed by Antoine Ly, Head of Data Science: “We are currently including explainability of models as a core part of our model governance processes”.
Explainability in risk modeling is a perfect example of the need to undertake the development of specific methods in order to make Responsible AI operational. Let’s deep dive on the specific example of machine learning explainability for actuaries.
Many methods used to explain machine learning models have been developed during the last few years, with the release of the concept of surrogate models. Here the principle is to fit an explainable model (linear, few variables) on a more complex one, that is on a black box model with sometimes tens of thousands of parameters, which arises e.g. when using deep learning. Several methods and toolboxes are available, but very few of them are usable in practice since explainability remains arguable and since there is no easy consensus nor adoption. Among the most famous ones we can cite LIME and SHAP. This latest method has a nice property: the contributions of variables sum to the total, which is a key property for human expert understanding.
On the other hand, if we take the example of actuaries’ risk modeling (e.g. auto claims, home flooding or robbery), as it is well-known that risks factors have a multiplicative effect, these experts are used to a certain kind of statistical models called Generalized Linear Models. Designing such models remains overall very manual and requires a strong effort. For these experts, the switch to machine learning models that are more automated, more complex, and less interpretable, is a real challenge. It has been very much discussed in the community for years, with no breakthrough.
Explainability is probably one of the main reasons for this conservatism. As far as all the research effort was focused on developing additive explainability, actuaries are not equipped with explainability methods and tools that would allow them to assess the multiplicative contribution of risk factors in machine learning models.
A recent paper has been released by the Emerton Data team, “XSHAP : towards multiplicative explainability of machine learning”, co-authored by Luisa Bouneder, Yannick Léo and Aimé Lachapelle, to specifically address this pain point for actuaries and to provide them with a tool to explain machine learning models the way they are used to understanding models.
**CLOSING REMARKS**
Making Responsible AI a reality relies on 3 main challenges: focus research on the right topics, develop adequate technological solutions, and set-up a governance in a complex and transverse environment.
Among the 3 challenges mentioned, only the first one seems to be already on track: better connecting the R&D effort to business reality. Indeed, this is a clear dedicated emerging activity for several bankers and insurers. The previous example of providing actuaries with specific explainability approaches that suit their current practices is part of the same goal.
Regulators and supervisors are expected to play a key role to make bankers and insurers implement Responsible AI in practice and to address the 2 remaining challenges (technological solutions and governance), by providing guidelines and rules.
One of today’s major questions is: How do we leverage regulation and supervision to create short-term incentives to make AI more Responsible, facilitating the development of tools and governance in banking and insurance organizations, without overly slowing down the actual innovation trend?
E.g. supervision requirements can stimulate the development of empirical audit tools but can also slow down Fintech/Insurtech innovation.
How do we ensure consistency with other regulations, e.g. GDPR which imposes time constraints to delete individual data, when AI regulation could impose to keep record of datasets used to train the algorithms?
NEW DATA AND PROCESS IMPROVEMENTS IN THE INSURANCE INDUSTRY
Christian ROBERT, PhD in applied mathematics from University Paris Denis Diderot and is a former student of the Ecole Nationale de la Statistique et de l’Administration Economique (ENSAE)
Insurance companies have always relied on their own claims data and a few variables obtained at the time of underwriting to price insurance contracts and offer their customers customized premiums. As one of the oldest and most traditional sectors of the economy, it has proven to be quite resistant to changes brought by new technologies until recently. But today, the sector is undergoing a profound transformation thanks to artificial intelligence and the arrival of alternative data such as images, texts, exchanges on social networks or information transmitted by the internet of things. Insurers are now using machine learning in traditional tasks to increase operational efficiency, improve customer service, detect fraud, ... but also in new tasks.
IMPROVING CLAIMS AND CLAIMS PROCESSES
The insurance industry handles thousands of claims and responds to an even greater number of requests from its customers. In some cases, claims do not require the work of human employees and it’s interesting to have automatic tools to respond to these claims and to leave more time for employees to deal with more complex claims. Insurance companies are automating parts of their claims handling process today, saving a lot of time and improving the quality of service. Machine learning can improve this process and automatically move claims through the system - from the initial report to analysis and contact with the customer.
Lemonade is a US insurance company founded in 2015 that uses AI to process claims faster and provide customers with prompt payments using various applications such as chatbots. More and more insurance companies are using algorithms capable of extracting handwritten or typed forms from a database with nearly 100% accuracy, helping insurers to reduce response and claim times.
Another example is the technology provided by Tractable, a start-up company that offers software to assess damage and predict repair costs using photos of claims to speed up claims processing. This start-up is changing the way motor insurers will assess claims amounts in the future. The technology examines property damage and predicts repair costs based on real-time photos so that claims can be settled more quickly. Instead of taking days or even weeks to assess a claim after a car accident, insurers using Tractable now only need a few minutes. Previously, this image recognition technology was not advanced enough, and companies did not have access to enough data for their models to operate accurately.
New image-based technologies could transform the way non-life insurers manage their claims and could be an important part of the broader transformation that artificial intelligence brings to the insurance claims process.
INCREASINGLY SOPHISTICATED UNDERWRITING ALGORITHMS
There is a famous saying in the world of actuaries: “There are no bad risks, only bad underwriting”. This means that insurance companies should be able to cope with most risks provided they find good pricing. However, many insurers continue to use traditional econometric methods combined with historical risk factors to assess risks. In this context, machine learning associated with new data can provide actuaries with new tools and methods to help them classify risks and calculate more accurate predictive pricing models that should ultimately reduce anti-selection. One example is motor insurance telematics, which is the combination of data collected by vehicles, wireless telecommunication technologies that facilitate the flow of information over large networks, and predictive algorithms. Current motor insurance models that use variables such as age, education level, marital status, vehicle type, etc. have found their limits in identifying the most dangerous and potentially life-saving driving behaviours on our roads. We are seeing the appearance of in-car devices in our vehicles that monitor our driving behavior.
PERSONALIZATION IN MARKETING
Customers expect to receive personalized services that match their needs, preferences and lifestyle. Creating personalized insurance experiences using advanced analytics and automated learning is now an option that firms can use to improve their marketing effectiveness. They can use data on individual preferences, behaviors, attitudes, lifestyle details and hobbies to create customized products, loyalty program services and recommendations. This is achieved by using machine learning algorithms applied to new data to develop suggestions tailored to specific customers through sophisticated selection and matching mechanisms.
By taking advantage of machine learning solutions, insurers can offer their clients personalized services, machine-generated insurance advice or even use chatbots to communicate directly with them. Younger consumers are prone to new technologies and the majority of them are willing to interact with machines in this context.
FRAUD DETECTION AND PREVENTION
Fraud is a major problem that costs for example the US insurance industry more than $40 billion a year. Insurance companies are looking for ways to effectively limit fraud and that could have a positive impact on their profit and loss accounts. And this is where machine learning algorithms can help. They begin to be intensively used by industry leaders to identify claims that are more likely to be fraudulent than others and subject them to further investigation by human employees. Machine learning tools allow insurance companies to take action against fraud much faster than when relying solely on human analytical capabilities.
NOWCASTING NATURAL DISASTER DAMAGES WITH SOCIAL NETWORK
Researchers have begun to use social media platforms to obtain information about natural disasters themselves. For example, it has been shown that the number of photographs uploaded to Flickr is highly correlated with the physical variables that characterize natural disasters (the atmospheric pressure during Hurricane Sandy, for example). Although it is not clear what causes this correlation - external information, network effects or direct observer effects - the correlation suggests that digital traces of a natural disaster can help measure its physical strength or impact very quickly. Based on a similar concept for tweets, other studies have tested the links between the spatial and temporal distribution of tweets and the physical extent of flooding, or the link between the prevalence of disaster-related tweets and the distribution of damage predicted by modelling in the case of Hurricane Sandy, or some studies have explored the feeding of tweets transmitting observations from social sensors in the field into predictive models to predict the perceived intensity of earthquakes.
Social media messages posted in the aftermath of a natural disaster have a predictive value that goes beyond the detection of the event itself. The exploitation of these digital traces provides more accurate knowledge of the situation, helping to estimate the consequences
of the disaster on the population and infrastructure in an almost immediate manner. To date, however, automatic damage assessment has not attracted much attention from insurers, but this should soon change.
In conclusion, since insurance companies have always worked with data, it makes sense for them to ride the wave of digital transformation and implement machine learning solutions that allow them to examine these data more deeply to discover new information. And these solutions are useful for everything from fraud detection to the development of underwriting algorithms that determine the best underwriting strategies. Machine learning is on the rise, so we are bound to see these applications mature and new ones appear on the insurance scene to accelerate the digital transformation of the industry.
**ROUND TABLE SPEAKERS**
**Charles-Albert LEHALLE**
Responsible for data analysis at Capital Fund Management (CFM, Paris) and Visiting Scholar at Imperial College (London), Charles-Albert studied Machine-Learning for Stochastic Control during his PhD, 20 years ago. He started his career as IA Project Manager at the Renault research center and joined the financial community in 2005 with the advent of automated trading. In 2016, Charles Albert was awarded the prize for the best article in finance by the Institut Europlace de Finance (IEF) and published more than fifty academic articles and book chapters. He is co-author of the book «Market Microstructure in Practice» (World Scientific Publisher, 2nd edition 2018), analysing the main characteristic of today’s markets. He is the Scientific Director of the interdisciplinary research programme «Finance and Insurance Reloaded» at Institute Louis Bachelier. This program explores the influence of new technologies (from the artificial intelligence blockchain) on the banking/financial/insurance industry.
**Helman LE PAS DE SÉCHEVAL**
Executive Vice President and General Counsel of Veolia. He is a veteran executive with a proven track record in both the finance sector and the environmental industry. He has extensive experience in capital markets, insurance, mergers and acquisitions, financial markets and private equity. He is a graduate of the Ecole Normale Supérieure and the École Nationale Supérieure des Mines in Paris.
**Oussama CHERIF**
Oussama is currently the Director of Innovation for the Smart Automation Solutions division of the Fives Group. During his 12-year career at Fives, he has also created and led the implementation of AI-based digital tools in industrial sectors such as the production of Aluminum, Steel or Machine Tools and more recently for the 3D metal printing industry. Before joining Fives’ innovation department in 2008, Oussama was one of the founders and later technical director at Miriad Technologies, a machine learning start-up. Oussama Cherif Idrissi El Ganouni is an alumnus of the École Polytechnique and ENSTA. He also received a PhD from ENS Cachan in Applied Mathematics on Image Segmentation and Parallel Computing.
Bruno DURAND
Bruno Durand is currently referent for Decision and Planning for Autonomous Driving for the Renault Group. During his 20 year career at Renault, he has also participated in numerous embedded software development projects as well as creating in 2016 an algorithmic development team dedicated to the data fusion of sensors used for ADAS (Advanced Driver Assistance). Before joining Renault, Bruno was responsible for several innovative projects at Miriad Technologies, a machine learning start-up. Bruno Durand holds a PhD from the Ecole Normale Supérieure de Cachan on «Multi-signal Neural Classification and Temporal Distortions» and its application to the recognition of decreased driver alertness.
Alain TROUVÉ
Head of Department of Ecole normale supérieure de Cachan, Cachan (ENS Cachan)
Anne-Sophie TAILLANDIER
Anne-Sophie Taillandier graduated from Supélec (CentraleSupélec) in 1992 and received a thesis in applied mathematics (machine learning) in 1998 from ENS Paris Saclay. She has extensive professional experience with various software publishers. She began her career at Dassault Systèmes in 1998 where she held various positions for 10 years. Before joining ITM, she was the CTO of LTU Technologies, a company specialized in image recognition. She also joined Cap Digital as an expert member of the knowledge commission. Since June 2015, she has been Director of TeraLab a Big Data and AI platform at the Innovation Department of the Institut Mines Telecom. TeraLab drives research and innovation by providing human and technological means as well as secure, independent and neutral infrastructures, enabling data providers, innovative companies and researchers to overcome technical and scientific barriers based on real-life use cases and data.
Nicolas VAYATIS
Nicolas Vayatis is a university professor and director of the Borelli Center (formerly known as CMLA) at the Ecole Normale Supérieure Paris-Saclay. He is a specialist in machine learning and mathematical modeling and leads a research group working in predictive modeling, network science, and industrial and biomedical mathematics. Nicolas is also co-directing the Master M2 Research Mathematical Vision-Apprenticeship (MVA) that trains more than 200 students per year in AI research.
Stéphane HERBIN
received an engineering degree from the Ecole Supérieure d’Electricité (Supélec), the M. Sc. degree in Electrical Engineering from the University of Illinois at Urbana-Champaign, and the PhD degree in applied mathematics from the Ecole Normale Supérieure de Cachan under the supervision of Robert Azencott. He was employed by Aerospatiale Matra Missiles (now MBDA) from 1998 to 2000. He joined ONERA in 2000, and has been working since then in the Information Processing and Modelling Department. His research addresses mainly the design of models and algorithms for data interpretation with a focus on images and videos.
This chapter will present excerpts from two of the FAIR’s round tables that are the alternative data round table and the IA, Math and Industry round table.
- Alternative Data: towards new corporate governance and price formation paradigm?, 14/01/2020, As part of the Euronext annual conference, accelerating growth in europe
- Artificial Intelligence, Mathematics and Industry, 14/05/2019, ENS Paris-Saclay, Cachan, Elements of Mathematics for AI
Artificial intelligence is being more and more popularized, made available to the general public and therefore to specialised actors in the finance and insurance industry. This has been achieved through two main channels. First, high grade machine learning tools have been open-sourced for everyone to contribute and access. Second, the world is producing more data than ever, which can be analysed precisely with those open-source tools. However, the finance and the insurance industry have been using data for a long time, so what’s new? In the first excerpt from the Alternative Data round table, Charles-Albert Lehalle shares his view on the general definition and classification of data to point out what alternative data refers to.
14/01/2020,
PAVILLON CAMBON, PARIS,
AS PART OF THE EURONEXT ANNUAL CONFERENCE, ACCELERATING GROWTH IN EUROPE
Charles-Albert LEHALLE
Alternative data is an original name because it doesn’t define it at all and in fact we started to say alternative because it’s non-financial data, i.e. in the financial world we are used to dealing with data generated by the markets, the most important data being used the price, which results from the confrontation between supply and demand and which summarizes a lot of information. Next, we looked at flow information, at the volumes of data exchanged, which is financial data generated by the financial world, then fundamental data on companies: balance sheets, which are also financial data generated by accounting, and finally by accounting through companies’ activity, and more recently many data sources have been invited into all this available information in the world around us. So to give you a few easy to understand examples: satellite images, geolocalization on our cell phones, credit card use, company job postings, therefore company job advertisements, transcripts of speeches by company managers, etc. So all of this is data that is certainly not data generated by the financial world, but which provides a great deal of information about the economic reality that surrounds us. If we want to try to understand a little bit and classify this data more, we can classify it by «originators»: who is the originator of this data. The first source of alternative data is you and me, individuals, through our activity we produce data. So when you drive a car, there is geolocation, when you enter a parking lot there is a count of people in the parking lot. When we consume with our credit cards, data is also generated. Our own activity, as individuals, when we have a watch that is connected, well, this watch can connect to the internet, put our itineraries, if we go jogging, on the internet every morning, the itinerary is stored, etc. So our activity as human beings and as part of the economic world is available and becomes data. Then there is data that is generated by companies, so I’m not talking about financial data, but just by their activity, so purchases and sales of raw materials, transportation for all the data that makes transportation, all the transportation data, by plane, by sea, by train, so all this activity of companies, web traffic, so B2B companies that connect, individuals - I didn’t name them those - who connect to websites and so that makes a second category of alternative data available. The third category is the one that is over, so in fact these are data that have existed for a long time but that were not electronic, it’s the data generated by agencies, so we can think of the INSEE in France, which publishes a lot of data on the state of the economy on a quarterly basis. Now there are a lot of independent agencies, there are news agencies, of course, which also provide figures on various objects in the world around us, and then there are various government agencies. All these agencies make up figures that are available. Three years ago now there was an Open Data initiative of the Banque de France. If you’re an academic, in particular, you can be eligible for this Open Data initiative and use data that is preserved and kept by the Banque de France.
The increasing use of artificial intelligence creates opportunities to look for patterns in this large amount of data with the goal of getting a better understanding of the underlying economy. By being more connected to the real economy, financial institutions and regulatory agencies hope to be able to improve their reactivity and overall understanding of fundamentals, whether it is driven by profit in the case of private institutions or by policy improvements in the case of regulatory agencies. In the following, there are two excerpts from the Alternative Data round table. First Helman le Pas de Sècheval and then Charles-Albert Lehalle both present some important use cases for alternative data and the questions that would be raised by those use cases.
Helman LE PAS DE SÉCHEVAL
“So to complete what Charles-Albert has just said, I would like to take two examples and try to see how this data differs from more traditional data. So, for the first example, you know what has a big impact on markets, is the publications of famous agencies, e.g. GDP growth, economic growth which is strong or weak or slowing down or accelerating, it usually has an immediate impact on markets, even before we release economic data, or employment data. Obviously everybody is looking forward to when US employment comes out, quarterly, and the markets usually react to this good or bad news.
So there’s a researcher in the United States, whose name I have, whose name is Apoorv Jain, and he decided to try to get the information faster than official agencies were releasing it. He simply analyzed 1.2 billion tweets from 230,000 people who were posting messages on Twitter and selecting of course «I lost my job» or «I found a job». And so clearly with the help of that analysis he managed to get, not the number obviously, not the precise figure, but clearly the trend. He was able to negotiate, trade as we say in the jargon on this market information. Let me take a second example, which is even closer to a manager job.
It’s a hedge fund called Point72 Asset Management which was cross-checked by three sources of data: firstly, classic online research, secondly, credit card transactions, then of course aggregated, anonymized, large volumes of credit card transactions, and finally, just like on Twitter, reviews of messages posted on social networks. So with the help of all this, it concluded that it was likely that Weight Watchers, a producer of low-fat meals, was losing ground to its competitors. So, it didn’t have the amount, nothing precise. You would say it got
the news ahead of time somehow and he was making money. So, I think what’s interesting actually is to try to characterize these data. These alternative data are well named: alternative data are to traditional data what alternative management is to management. So we can see that it is not official information, it is not financial statements, nor analyst presentations. They are not press releases from press issued by listed companies or agencies in the case of my first example. Yet it is clear that this is data that requires not only formatting but also analysis, a thorough analysis. You must extract the signal from the noise and then you have to go and do the right analysis. So as Charles-Albert said, there are four essential data sources: Firstly, there is everything that involves satellite images and drones, secondly, there is everything that comes out of the payment means that have been digitized over the past twenty years. So all the bank card transaction data. There is the classic skimming of what can be found on the internet which is more and more abundant, and then finally there are these social networks in which everyone, finally, when you look at the number of individual terminals, the progression of the number of individual terminals and the use of these individual terminals by people, you can see that the data explosion has been exponential and that as a result it has become Finally, when you look at the number of individual terminals, the progression of the number of individual terminals and the use of these individual terminals by people, you can see that the explosion of data has been exponential and that as a result it has become an extremely interesting mass of data. If you know how to work with it, you can find things.”
Charles-Albert LEHALLE
“So maybe before I give the floor to business, I’ll talk about central banks that have a similar problem, since a central bank’s prerogative is to make governance decisions at the country level, and ultimately the only weapon a central bank has is surprise, i.e. it’s managing the surprise effect. If information is available on the state of the economy in real time, in an extremely relevant way, then the academic discipline that is developing on this is called now casting, by analogy with forecasting, which is to guess the future, then we are only trying to guess the present. Therefore, if we have the state of the economy in real time, what is the capacity to surprise a central bank?
So, that’s a real challenge and there’s a real transformation today of central banks that have several hundred economists who usually publish reports at the rate of a human being by digesting information, they’re also specializing and having labs, data labs, using a machine to try to understand how to make sensors on the state of the economy that allow them to «compete» in quotes with investors and market participants.
So, the problem already exists at the country level. Obviously, at the company level I think similar things are happening, where there is a kind of competition. Traditionally, when you think about market actors in the old economic theory, market players and then company players, the latter have the private information and the ability to decide, and that’s what makes it possible for them to make money, to earn money, to have a successful business. On the side of market participants, it is rather information on the flows that are available. In an investment bank, what they have is information on flows, so they will give a price to the liquidity, which depends on whether or not everyone wants to buy. So, all I see are flows, and I learn from this that the price will go up, so I won’t give the same price for liquidity to people who want to buy as to people who want to sell, and that’s how these two forces are regulated. Intermediary actors, market participants who have information about financial flows and little information about economic and fundamental reality, and fundamental companies and investors who lease capital by following longer-term and medium-term information. Nowadays we can ask ourselves if the balance is not changing. It has already happened, we have already had the debate on the frequency trader when it was pointed out, on the frequency trader, when they had access to fundamental information in any case, e.g. they had computers, they could read the news, they could read the dispatches. So, they were more on equal footing with a traditional market maker who only sees the flows and who already has a lot of effort to assimilate all the financial flows that they have to respond to, the requests to buy and sell, well, they’re on an equal footing because they know all the flows but no more than the investor who knows the information, who can understand what’s going on in the news, read the newspaper and so on.
Technological actors today can process fundamental information, or a first filtering of fundamental information, and that changes the balance, and that is a world that all actors have to be prepared to enter. How do I make decisions that are increasingly public. And so I find it harder to preserve some sort of advantage from operating on information that only concerns my company and me?”
Although it might be the case in the future, it is important to note that none of these use cases work perfectly as of 2020. There are indeed a number of limitations that prevent the ideal goal of being able to perfectly anticipate everything. First, alternative data are usually not very precise. Although regular data can also be imprecise because of aggregation, alternative data are imprecise by nature. In general, publicly available sources of data concern flows while the internal state of inventory will have to be estimated for instance. Another important limitation relates more directly to the tools used. Indeed, machine learning algorithms, in general, lack explainability which makes it quite challenging to detect bad modelling or biased learning for instance. The following two excerpts from FAIR’s round tables detail those ideas. First, in the Alternative Data round table, Helman le Pas de Sècheval and Charles-Albert Lehalle, present their views on imprecision in alternative data. The second excerpt is a discussion between Charles-Albert Lehalle, Oussama Cherif, Bruno Durand, Anne-Sophie Taillandier and Stéphane Herbin in the IA, Math and Industry round table. The second discussion is not directed specifically toward the financial system, but as a general AI concerns, the lack of safe learning environments they mention can be directly extended to the financial context.
Helman LE PAS DE SÈCHEVAL,
So the difference, to get back to it, is that it is at the same time less precise. We manage to have clues, trends, to have leading indicators as we say in economics, but not precise data. We can see that it is less reliable. If there is a place where fake news is spreading it is first and foremost on social networks. So all these tweets that we are analyzing may be part of «wishful thinking» like we thought, people who are acting rather than corresponding to a specific reality, when we compare this to the process of production and verification of information that I called traditional, i.e. the information disseminated by listed companies or by agencies that publish statistics. But as it comes out ahead of the phase, in advance, it is obviously data that can be processed, that can be traded on the markets.
Charles-Albert LEHALLE,
Yes, in order to give an idea of the level of ease, of the noise level of the information that can be extracted from this data, I think that we have to consider that we are observing all this information related to a company in activity, and therefore often this information represents flows, because what we are observing are incoming and outgoing flows, or customers, or the supply of raw materials, or things that happen in parking lots, in warehouses, etc. And so we see flows, which are noisy because we don’t have all the flows, and it’s true that there are companies, there are activities that are essentially activities of flow and transformation with just-in-time flows. So, if this is the case, this extra-financial information will give a rather precise vision of what is happening in the company’s balance sheet. If now we have companies that manage stocks and therefore have private information that remains inside the company and therefore is difficult to capture by external means regarding the state of the stocks, then understanding the level of noise to comprehend the state of the company’s good health or not is more complicated. An anecdote about this is the use of satellite images to understand oil stocks, which were much more used in the last ten years. So it’s quite easy because where the oil is stored is in large tanks, they have a removable roof to prevent the oil from coming into contact with oxygen, and so in fact there is a drop shadow, and with satellite images, by measuring the drop shadow you can see whether the tanks are full or empty. It’s a technique that has been used for a very long time, i.e. imagery to understand the state of oil stocks. Which is not enough because you also need to know the state of the supply and what’s there now. But if we look at the stocks, well, a few years ago the oil companies understood that this is normally private information about the way they managed their stocks and they put covers on top of all these containers, and in fact now we don’t have any more information on the state of the stocks with satellite images. So this frontier, we can see that these images that are available outside the companies, it’s more like flow information, it allows us to understand the state of the balance sheet and the good health or not of the company. If it’s a company that essentially does just-in-time transformations, since when we see what comes in and what goes out, we actually see what is gained or not gained. So, there is private information that is preserved, that can be preserved, and this is what makes the noise level on some activities higher than on others.
Oussama CHERIF
Yes indeed. There is a first issue, that Robert raised, It seems to me that artificial intelligence makes people lazy. Handing over to them once they get used to being passive is going to be a bit complicated. Maybe we should rethink uses differently. Here, I’m going to tease Bruno a little bit on the autonomous car. Do we really need an autonomous car or is the only interesting aspect of the autonomous car to actually replace a valet? I go home or I go to a restaurant, I leave the car, empty, to park by itself. In any case, it will drive smoothly and since there are no passengers inside, it actually solves a number of problems: a primary objective, not to injure pedestrians, and a secondary one, to avoid damaging the car. I’m exaggerating a little bit, but there may be similar things to think about.
Bruno DURAND
Even if we test them, validate them, and revalidate them, our systems are indeed not perfect. What we always try to do is plan how we’re going to hand over to the driver. For instance, on the service that consists of triggering emergency braking if the user forgets to brake on an obstacle, when this time becomes less than 2.5s, we switch on a light on the dashboard, which is therefore a first reminder that we send to the driver to take back the hand. If the driver does nothing and there is a collision that is getting closer, a buzzer will sound, which will also incite the driver to regain control.
This is a first example. On more autonomous examples of vehicles, which we expect to see within the next two years, the usage case is as follows: I’m on the highway or on the outskirts in a dense traffic situation. I’m driving at less than 70 km/hr. In this case, what the system will do is to position you in the lane in which you are and regulate your distance from the vehicle in front of you, managing the lane entries of people coming into the lane, motorcycles coming up from the lanes, and so on. What is the driver asked to do? The driver must be seated in the driver’s seat. However, they are not required to have their feet on the pedals, nor their hands on the steering wheel, nor even to look. They can read, knit or eat. However, they are warned that they may be asked to take over. In this case, they have 10 seconds to do so. During those ten seconds, we must continue to ensure a safe trajectory.
Generally speaking, we try to assure the driver that the car is in control of the scene in which it is driving. This objective is achieved, for example, via the HMI, in which we present what the system has perceived, what obstacles and vehicles the system has perceived and what lines and lanes the system has detected.
Anne-Sophie TAILLANDIER
On research projects that I could see or follow from a distance, I found that it was very interesting to have an involvement from the social sciences and humanities, i.e. that there is a mathematician and a scientist, on the AI and algo side, and that there is also a team in the social sciences
and humanities. It seems to me that AI results in collaborations with social sciences, which I did not expect and which is very interesting. This is for instance the case in the health field. You can imagine a lot of things. It is rather a quantitative approach that will be brought by the very scientific side and a perhaps more qualitative approach that will be brought by the social sciences. I find that the results are very valuable and innovative.
Stéphane HERBIN
The question of monitoring troubles a lot of people at this time, especially in all steering systems, for example. There are the car piloting systems, but the piloting systems of big planes that crash from time to time. The last accident may be due to a defect in the relationship between a system and a human. It is true that these are things that have an impact.
As for doing something interdisciplinary, yes, I think there is also neuroscience that has a big role to play in this, since we are doing intelligence.
Charles-Albert LEHALLE
That’s good, we are concluding the round table by addressing the initial topics of interdisciplinarity that you claimed to be something that goes along with the artificial intelligence. Finally, even if we are not necessarily all promoters of this term, artificial intelligence, there is still something behind it that draws other disciplines than hard sciences to interact on rather social and societal issues. Perhaps that’s why it deserves to be called intelligence.
The increasing need for data analysis with AI algorithms creates a shift in the skills that were used to be required by traditional actors in the finance and insurance sector. The ideal skill set would be: i) technical skills to implement a particular algorithm for alternative data collection or to deploy large machine learning models, ii) sector specific skills which are needed to create good predictive models, and iii) strong mathematical skills because in the end a machine learning model is nothing more than a mathematical model. Although some education programs are already shifting to incorporate all those skills, it will probably be quite challenging to find all of them in a single profile. This creates an important HR issue because teams with individuals with very different skills will have to efficiently work together in order to allow for this better connection to the real economy. To end this chapter, here are two discussions that happened during the IA, Math and Industry round table. Those two discussions extend the idea of the wide range of needed skills as well as a more precise discussion regarding the role of academia in this challenging context. Although those discussions concern any industry, the financial and insurance industry are not specific and will have to deal with the same issues as more general industries.
Alain TROUVÉ
The first question I’m going to ask you is the following: what should we think about the role of balances and interactions between three types of profiles? A profile that is data oriented and about hardcore learning, in which you need to know PyTorch, Tensorflow. You have to know Hadoop, Python and also perhaps calculation structure problems. A profile that is more of a mathematician, focused on models’ manipulation and their properties and algo construction. Finally, the business profile, or for its academic version, the expert profile for questions and domain, who knows the main paradigms and the prerequisites of the domain. There are therefore three types. This may be too simple a classification, but what can be said about these three elements? What are their roles? What are the balances and interactions? Does it change? Is it an obsolete vision?
Oussama CHERIF
I think the third profile is the most serious one, i.e. the one who knows the trade. It seems to me that the question to raise is the following: what is the purpose of AI? Why do we do it? Is it just for fun? In the industry, we lack experts and we especially lack the possibility of being able to transmit expertise from one area to another, from one generation to another. We want to be able to build, improve an expertise and/or be able to transmit it through tools. Do we need someone who only masters tools, like TensorFlow, etc.? All you have to do is place an offer and there will be plenty of people who will come forward. Personally, I have a little sympathy towards the mathematician profile. Moreover very often in our teams, I try to play this mathematician role, especially to allow people to think differently, because they have a very engineer-like or down-to-earth approach. At a given moment, you have to take a step back and you need to have an abstraction background to be able to do that. You have to have a mathematician background, you don’t have to be a proven mathematician, but you need that kind of profile.
Anne-Sophie TAILLANDIER
I believe that AI, even if it’s a bit of a buzzword right now - we used to call it big data three or four years ago -, what it’s really changed in companies... I feel it strongly. Among all the projects we follow on Teralab - we have more than sixty of them, in all fields, agriculture, industry, health, etc. - we’ve been working on a lot of projects. Companies need to open up to the outside world. I think that what Oussama has just pointed out is very important. There is a need to be able to pass on this knowledge, especially in the car industry. There are automotive engineers who were there and who must also pass on their knowledge and be able to discuss with data scientists, data engineers, who will prepare the data, and so on. It’s something that is quite cross-disciplinary. It can also shake up habits in companies. There can be internal power struggles. There may be departments that say: it’s AI, it’s my place. There is a question of change management, which is still very important and is an important obstacle. And that’s true in all economic sectors. The data scientist, that sort of five-legged sheep that everyone is looking for, who is at the same time a mathematician, a bit of a geek, knows how to use things, has to work with people in the trades, has to be able to understand what we are looking for, and has to be able to take into account the company’s information system, because there is a technical architecture that has to be implemented. In the end, it’s really a team effort. This kind of teamwork can also be done with outside teams. Sometimes, internal teams need a bit of inspiration - that’s why they try to interact with laboratories - in order to lift the technological or scientific barriers. So I want to stress the crucial role of people who know the business and who are sometimes from another generation than data scientists... And this exchange is critical.
Bruno DURAND
Indeed, at Renault, there is a big buzz on AI, there are lots of people and structures that are being set up. Particularly an IA expertise channel that is influencing various trades: design, manufacturing, sales and after-sales.
What we are asked to do is to make a car with different services, such as a driving assistance system.
The major constraint is that we have little or no ground truth. The cost of acquiring and labelling ground truth is very high: e.g. knowing where the vehicle in front of me is, what angle it has in relation to me, how fast it is going, what class it is in, etc. We do small data collections on equipped circuits, but far away from real traffic. For these instrumented scenarios, we equip different vehicles, cyclists and pedestrians with very precise GPS markers, and after a week, we manage to have a few kilometers with a ground truth on the positions and speeds of these objects. Apart from that, we don’t have any labeled data, i.e. data on which we have a very precise ground truth. Consequently, for the generation of vehicles to be marketed within five years, we didn’t start with a massive learning curve, which would have required millions and millions of data. I stress that the cost of qualified, clean data, for which we are ready to swear that it tells the whole truth, is very high. Of course, precise and measured tests are carried out, such as crash tests, for instance. The service consists in avoiding a collision with a vehicle, a cyclist or a pedestrian. For these tests, the car is allowed to brake by itself on the obstacle. I reassure you, the targets used are made of plastic.
In addition, we drive 800,000 km to verify that on this performance, we will not brake, untimely, for nothing. But most of this massive driving is done without ground truth. This being said, artificial intelligence plays a role in the processing chain of our data.
In order to carry out our services (obstacle avoidance, centering in the lane and regulation, in distance from the vehicle in front of us, etc.), we have a certain number of sensors: cameras, radars, LIDAR. We buy smart-sensors from equipment manufacturers that preprocess acquired raw data and give back in return lists of obstacles and lines, with kinematic (position, speed) and static (class, size) attributes. These sensors are far from perfect. For example, a radar is very bad at classifying an object, unlike a camera. A radar is very good at estimating radial velocity, something a camera does quite badly. Afterwards, we use the imperfections of the different sensors to have overlaps and imperfections that are not of the same nature each time on the different kinds of sensors. We do more things like tracking with Kalman filters. In short, on the whole processing chain, some components are clearly IA (detection of objects by a camera), others are less IA typed (fusion by Kalman filter).
As is often the case for industrial projects, the efficiency of the processing chain in its entirety is essential. We develop certain components ourselves, possibly intelligent ones, but our role is above all to master the process from start to finish. We don’t need big theories, but rather to implement a lot of simple and mastered ideas. We don’t need big theories, but rather to implement many simple and mastered things.
Stéphane HERBIN
I will go back to the relationship between modeler and computer scientist. I think that what we’re experiencing now is that we’re running systems that we don’t understand. Typically, what we put into systems that come from learning, which is what Bruno was talking about, are cameras that provide direct object detection. They provide things, but why did they provide them, and how? We don’t really know. First of all, because there are intellectual property issues, and even, fundamentally, all those who have tried a bit of deep learning, we manage to get results, but we often don’t understand why. And the question, more epistemological or societal, is also: are we ready to pay the price of not understanding something, but of using it anyway? Are we capable of accepting the fact that we won’t be able to go through with the modelling? On the contrary, we are going to be able to develop systems that could really be used, derived from data in general, knowing that the data cost is important. I think we’re seeing a paradigm shift here. It’s a real epistemological shift. This is perhaps what we are currently experiencing. Ten years ago, in vision and image processing, we were trying to find the characteristics and the best filter that would provide the right result. In vision, almost nobody does that anymore. We extract characteristics and get by with them. If we look back, we find that it’s not very interesting. We’re going to lose efficiency and what do we gain? That’s a bit like that too. Are we ready to lose efficiency in order to gain understanding? That’s a real question.
Nicolas VAYATIS
I have a quick question. Given your experience, your position and your knowledge of the research world, how do you perceive expectations that companies have today regarding laboratories? Are there things that are changing? How do you view these relationships? Do scientists need to work in a certain way to support the transfer of knowledge and technology towards companies? The feedback we get is that there is a certain difficulty in grasping the state of the art as it is presented today, because there is really a lot of work. It’s quite difficult for people who don’t have the right codes to find their way around. How do you view this issue?
Bruno DURAND
As far as Renault is concerned, in parallel with the short-term work carried out for vehicles that are due to come out in two or three years, we have five CIFRE PhD students who continue to connect with different state of the art research to understand what will happen on the engineering market in the upcoming years. It stays a very normal functioning where the company, in order to learn, continues to collaborate with labs.
Anne-Sophie TAILLANDIER
Of course there is the classic model, with theses. It will continue to exist. It is in line with what you were saying, Charles-Albert, about continuing education. We can see that all this is evolving very quickly. There is a need for feedback from research done in labs that we can start to integrate into companies. Data scientists in these companies need to interact with researchers in labs. They need to be confronted with inspiring ideas and projects. Of course, companies need to get back intellectual property. They need to be able to implement what researchers are doing in labs. The Chairs model, for instance, is a model that industries continue to appreciate even if they are sometimes a little frustrated at not getting immediate return in terms of intellectual property. This Chair model may need to evolve. Chairs enable company’s engineers and researchers to work together on common problems and data sharing. Being able to experiment on company data is a very important point. As AI-related technologies evolve very quickly, and there is a very strong competitive aspect between companies for applications, everyone would like to be the first to implement this type of AI or new algorithm. Companies continue to fund chairs, but are frustrated by not being able to directly implement the results internally.
Charles-Albert LEHALLE
Thanks to my position at the Institut Louis Bachelier, I am indeed seeing a change of model. Industrial partners are asking for more than just research papers from academics with whom they collaborate. They want actionable research. It is interesting to note that there is also a similar demand within the academic community around the concept of reproducible research. When you are an editor of an academic journal, how do you set up articles, some of which are essentially proposals for algorithms? We must find a way to have a living and runnable version of an article when we publish, so that it can be really checked against real alternative datasets than those of the academic team that submits the article for publication. The journal’s editors must ensure that they do not publish an algorithm that only works with the data of a particular
article. This is somewhat similar industrial’s concern: they require that the results of a chair or the results of a collaboration are also operable. I think this is a need that emerges in a totally cross-cutting way. In my opinion, we must try to provide the same type of response for scientific journals and industries.
- Robo-advisor, 16/01/2020, ACPR, Paris, Organized by FaIR (coming soon)
- Alternative Data : towards new corporate governance and price formation paradigm ?, 14/01/2020, a part of the Euronext annual conference, accelerating growth in europe
- Deep Learning vs. Theory: Illustration with Deep Hedging, 19/12/2019, AFGAP, Organized by FaIR (coming soon)
- New Challenges in Insurance 05/09/2019, Conservatoire National des Arts et Métiers, Paris, Organized by Toulouse School of Economics (coming soon)
- Resolution of post-trades via a distributed ledger, 20/05/2019, acpr, PARIS, Organized by FaIR
- Artificial Intelligence, Mathematics and Industry, 14/05/2019, ENS Paris-Saclay, Cachan, Elements of Mathematics for AI (coming soon)
FAIR
an Institut Louis Bachelier interdisciplinary program
Finance and Insurance Reloaded
|
3c52aef2-15ce-4b4c-a22c-747363d4c05c
|
CC-MAIN-2023-40
|
https://www.paris-europlace.com/global/gene/link.php?doc_id=21044&fg=1
|
2023-10-04T06:58:02+00:00
|
s3://commoncrawl/cc-index/table/cc-main/warc/crawl=CC-MAIN-2023-40/subset=warc/part-00093-7aa0a1e5-33a6-434b-89a2-950f294b40c1.c000.gz.parquet
| 1,018,685,097
| 62,480
|
eng_Latn
|
eng_Latn
| 0.943144
|
eng_Latn
| 0.995476
|
[
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"nld_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn",
"eng_Latn"
] | true
|
docling
|
[
99,
7073,
12267,
17184,
19592,
22649,
27045,
35068,
43109,
49663,
52021,
55422,
58495,
62187,
71172,
76945,
83034,
87612,
91065,
97351,
100783,
107407,
115089,
121586,
128413,
136806,
138702,
143013,
151304,
158881,
163054,
171005,
175507,
182372,
189511,
195406,
198477,
203087,
209818,
218085,
225201,
232899,
236081,
240371,
247222,
254063,
261318,
264355,
267272,
274387,
281886,
287563,
294711,
302656,
303721,
303814
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.