Regional competition, environmental decentralization, and target selection of local governments

2021 ◽  
Vol 755 ◽  
pp. 142536
Author(s):  
Guoxiang Li ◽  
Fanyong Guo ◽  
Danyang Di
2013 ◽  
Vol 734-737 ◽  
pp. 3071-3074
Author(s):  
Guo Dong Zhang ◽  
Zhong Liu

Aiming at the phenomenon that the chaff and corner reflector released by surface ship can influence the selection of missile seeker, this paper proposed a multi-target selection method based on the prior information of false targets distribution and Support Vector Machine (SVM). By analyzing the false targets distribution law we obtain two classification principles, which are used to train the SVM studies the true and false target characteristics. The trained SVM is applied to the seeker in the target selection. This method has advantages of simple programming and high classification accuracy, and the simulation experiment in this paper confirms the correctness and effectiveness of this method.


2006 ◽  
Vol 18 (6) ◽  
pp. 880-888 ◽  
Author(s):  
Markus Conci ◽  
Klaus Gramann ◽  
Hermann J. Müller ◽  
Mark A. Elliott

Illusory figure completion demonstrates the ability of the visual system to integrate information across gaps. Mechanisms that underlie figural emergence support the interpolation of contours and the filling-in of form information [Grossberg, S., & Mingolla, E. Neural dynamics of form perception: Boundary completion, illusory figures and neon colour spreading. Psychological Review, 92, 173–211, 1985]. Although both processes contribute to figure formation, visual search for an illusory target configuration has been shown to be susceptible to interfering form, but not contour, information [Conci, M., Müller, H. J., & Elliott, M. A. The contrasting impact of global and local object attributes on Kanizsa figure detection. Submitted]. Here, the physiological basis of form interference was investigated by recording event-related potentials elicited from contour- and surface-based distracter interactions with detection of a target Kanizsa figure. The results replicated the finding of form interference and revealed selection of the target and successful suppression of the irrelevant distracter to be reflected by amplitude differences in the N2pc component (240–340 msec). In conclusion, the observed component variations reflect processes of target selection on the basis of integrated form information resulting from figural completion processes.


Author(s):  
SERGEY I. ROMANOV ◽  

The article deals with a special type of euphemisms-amulets, that is, linguocultural units endowed with the function of protection. There are two types of euphemisms-amulets from the point of view of relevance: obsolete and current units. Obsolete euphemisms- amulets have targets that are not recognized as dangerous by the modern linguistic and cultural community. Current euphemisms-amulets, although not always consciously, are used by representatives of the modern Russian linguistic and cultural community to protect against something bad. The paper establishes that the use of the euphemism-amulet is based on the transla- tion of the target's representation into another cultural code. The work reveals that the euphemisms-amulets are directed not to mitigate an unwanted nomination but how to replace it. An undesirable nomination is endowed with negative magical properties, which is why the linguocultural community imposes a ban on its use. A protective cultural function is superim- posed on the euphemism. The main pragmatic explanation for the use of the euphemism- amulet is the speaker's desire not to predict an encounter with an unwanted object, which is based on belief in the magical power of the word. The factors that determine the linguocultural specificity of euphemisms-amulets are revealed. The first factor is target selection. For the Russian linguocultural community, such targets include a totemic animal, evil forces representing another world, death. The second factor is the selection of nominations for the euphemistic function, which is determined by culturally marked background knowledge, ideas, and typical practices. The communicative- pragmatic platform for the use of euphemisms-amulets is the belief in the magical power of the word, in the fact that the use of the forbidden word can lead to negative consequences (in particular, to cause the appearance of something dangerous, undesirable). The work proves that the identified cultural factors are universal, based on universal archetypes: one's own / another's, permission / prohibition, life / death. At the same time, the fact of the appearance of the euphemism-amulet, the choice of its internal form is determined by national and cultural factors.


2015 ◽  
Vol 84 (1) ◽  
pp. 3-28 ◽  
Author(s):  
James A. Green ◽  
Christopher P.M. Waters

For self-defence actions to be lawful, they must be directed at military targets. The absolute prohibition on non-military targeting under the jus in bello is well known, but the jus ad bellum also limits the target selection of states conducting defensive operations. Restrictions on targeting form a key aspect of the customary international law criteria of necessity and proportionality. In most situations, the jus in bello will be the starting point for the definition of a military targeting rule. Yet it has been argued that there may be circumstances when the jus ad bellum and the jus in bello do not temporally or substantively overlap in situations of self-defence. In order to address any possible gaps in civilian protection, and to bring conceptual clarity to one particular dimension of the relationship between the two regimes, this article explores the independent sources of a military targeting rule. The aim is not to displace the jus in bello as the ‘lead’ regime on how targeting decisions must be made, or to undermine the traditional separation between the two ‘war law’ regimes. Rather, conceptual light is shed on a sometimes assumed but generally neglected dimension of the jus ad bellum’s necessity and proportionality criteria that may, in limited circumstances, have significance for our understanding of human protection during war.


Author(s):  
Henrik Skovsgaard ◽  
Kari-Jouko Räihä ◽  
Martin Tall

This chapter provides an overview of gaze-based interaction techniques. We will first explore specific techniques intended to make target selection easier and to avoid the Midas touch problem. We will then take a look at techniques that do not require the use of special widgets in the interface but instead manipulate the rendering on the basis of eye gaze to facilitate the selection of small targets. Dwell-based interaction makes use of fixations; recent research has looked into the other option, using saccades as the basis for eye gestures. We will also discuss examples of how eye gaze has been used with other input modalities (blinks and winks, keyboard and mouse, facial gestures, head movements, and speech) to speed up interaction. Finally, we will discuss examples of interaction techniques in the context of a specific area of application: navigating information spaces.


Author(s):  
Ward Prystay ◽  
Andrea Pomeroy ◽  
Sandra Webster

Some of the largest oil and gas projects in Canada are currently being proposed in British Columbia. Establishing a fulsome and scientifically and socially defensible scope for environmental assessments in the oil and gas sector is a serious challenge for government and proponents. The approach taken by the federal National Energy Board to scope effects assessments on pipelines is quite different than the approach taken by the British Columbia Environmental Assessment Office on other types of oil and gas projects. The NEB has published guidelines for scoping and conducting environmental and socio-economic assessments within its Filing Manual (National Energy Board [NEB] 2014). This manual sets out the expectations for scoping, baseline information, and effects assessments to be submitted as part of approval applications. Proponents are expected to provide all information necessary to meet the guidelines. In British Columbia, the environmental assessment process is dictated by the British Columbia Environmental Assessment Act and includes a negotiated terms of reference for the assessment, called the Application Information Requirements (AIR). The approach to selection of valued components is guided by provincial guidelines (EAO, 2013). The first draft of the AIR is prepared by the proponent and is then amended to address matters raised by federal and provincial agencies, local governments, and representatives of potentially affected First Nations. Through two to three revisions, the scope of assessment is jointly established and then formally issued by the government. While there are valid reasons for the differing federal and provincial approaches to scoping environmental assessments, each of these processes create risks for proponents in terms of project timelines and costs for preparing the environmental assessment. More specifically, the use of generic and negotiated guidelines can result in a number of issues including: • A scope of assessment that is broader than necessary to understand the potential for significant adverse effects • Inclusion of issues that are “near and dear” to a specific regulator or community but has no direct relationship to the effects of the project itself • Selection of valued components that do not allow for defensible quantification of effects or use of directly relevant significance thresholds • Selection of valued components that are only of indirect concern as opposed to focusing the assessment on the true concern. • Double counting of environmental effects • Risks in assessing cumulative effects This paper discusses where and how these risks occur, and provides examples from recent and current environmental assessments for pipelines and facilities in British Columbia. Opportunities to manage the scope of assessment while providing a fulsome, efficient, effective and scientifically/socially defensible assessment are discussed.


2002 ◽  
Vol 9 (4) ◽  
pp. 641-653 ◽  
Author(s):  
Alberto Mercatanti ◽  
Giuseppe Rainaldi ◽  
Laura Mariani ◽  
Roberto Marangoni ◽  
Lorenzo Citti

2015 ◽  
Vol 2015 ◽  
pp. 1-6 ◽  
Author(s):  
Mathias Vormehr ◽  
Barbara Schrörs ◽  
Sebastian Boegel ◽  
Martin Löwer ◽  
Özlem Türeci ◽  
...  

Advances in nucleic acid sequencing technologies have revolutionized the field of genomics, allowing the efficient targeting of mutated neoantigens for personalized cancer vaccination. Due to their absence during negative selection of T cells and their lack of expression in healthy tissue, tumor mutations are considered as optimal targets for cancer immunotherapy. Preclinical and early clinical data suggest that synthetic mRNA can serve as potent drug format allowing the cost efficient production of highly efficient vaccines in a timely manner. In this review, we describe a process, which integrates next generation sequencing based cancer mutanome mapping,in silicotarget selection and prioritization approaches, and mRNA vaccine manufacturing and delivery into a process we refer to as MERIT (mutanome engineered RNA immunotherapy).


Sign in / Sign up

Export Citation Format

Share Document