The Third Front: Defence Industrialization in the Chinese Interior

1988 ◽  
Vol 115 ◽  
pp. 351-386 ◽  
Author(s):  
Barry Naughton

Between 1964 and 1971 China carried out a massive programme of investment in the remote regions of south-western and western China. This development programme – called “the Third Front” – envisaged the creation of a huge self-sufficient industrial base area to serve as a strategic reserve in the event of China being drawn into war. Reflecting its primarily military orientation, the programme was considered top secret for many years; recent Chinese articles have discussed the huge costs and legacy of problems associated with the programme, but these discussions have been oblique and anecdotal, and no systematic appraisal has ever been published.2 Since Chinese analysts have avoided discussion of the Third Front, western accounts of China's development have also given it inadequate emphasis, and it has not been incorporated into our understanding of China during the 1960s and 1970s. It is common to assume that the “Cultural Revolution decade” was dominated by domestic political conflict, and characterized by an economic system made dysfunctional by excessive politicization, fragmented control, and an emphasis on small-scale locally self-sufficient development. The Third Front, however, was a purposive, large-scale, centrally-directed programme of development carried out in response to a perceived external threat with the broad support of China's national leaders. Moreover, this programme was immensely costly, having a negative impact on China's economic development that was certainly more far-reaching than the disruption of the Cultural Revolution.

2018 ◽  
Vol 17 (1) ◽  
pp. 87-101 ◽  
Author(s):  
Feng Deng

Purpose Many studies on witch killings in Africa suggest that “witchcraft is the dark side of kinship.” But in Chinese history, where patriarchal clan system has been emphasized as the foundation of the society, there have been few occurrences of witch-hunting except a large-scale one in the Cultural Revolution in 1966. The purpose of this paper is to explain the above two paradoxes. Design/methodology/approach Theoretical analysis based on preference falsification problem with regard to the effect of social structure on witch-hunting is carried out. Findings There is a “bright side of kinship” due to two factors: first, it would be more difficult to pick out a person as qualitatively different in Chinese culture; second, the hierarchical trust structure embedded in the Chinese culture can help mitigate the preference falsification problem, which acts as the leverage for witch-hunting. In this sense, an important factor for the Cultural Revolution is the decline of traditional social institutions and social values after 1949. Originality/value This paper is the first to advance the two paradoxes and offer an explanation from the perspective of social structure.


1990 ◽  
Vol 123 ◽  
pp. 485-502 ◽  
Author(s):  
Randall Stross

During the 1980s, bracketed by the Third Plenum in 1978 and the suppression of the democracy movement in 1989, China edged, step by step, away from the orthodoxies of the Cultural Revolution, and each reversal excited a certain amount of commentary both within and without China. As time passed, and the list of reintroduced institutions and practices grew ever longer, habituation reduced the surprise of succeeding announcements. But the reintroduction of advertising, a cental totem of advanced capitalist culture, occupied a particularly significant place on the list because its reappearance in China forced the Chinese to reconsider distinctions that had formerly been drawn between capitalist and socialist societies. For most of its history, the People's Republic had castigated advertising as the apotheosis of the capitalist religion of consumption. This was especially so in the late 1960s during the height of the Cultural Revolution. Afterwards few commercial billboards or newspaper advertisements interrupted the skein of relentlessly political messages that crossed public space. When advertising was officially reintroduced in 1979, and its sanctioned scope expanded beyond industrial goods, the state faced a daunting ideological task: rebuilding a case for advertising in a socialist system that had long defined itself as one that did not need commercial exhortation. In essence, it had to sell the legitimacy of selling.


2021 ◽  
Author(s):  
Aleksandar Kovačević ◽  
Jelena Slivka ◽  
Dragan Vidaković ◽  
Katarina-Glorija Grujić ◽  
Nikola Luburić ◽  
...  

<p>Code smells are structures in code that often have a negative impact on its quality. Manually detecting code smells is challenging and researchers proposed many automatic code smell detectors. Most of the studies propose detectors based on code metrics and heuristics. However, these studies have several limitations, including evaluating the detectors using small-scale case studies and an inconsistent experimental setting. Furthermore, heuristic-based detectors suffer from limitations that hinder their adoption in practice. Thus, researchers have recently started experimenting with machine learning (ML) based code smell detection. </p><p>This paper compares the performance of multiple ML-based code smell detection models against multiple traditionally employed metric-based heuristics for detection of God Class and Long Method code smells. We evaluate the effectiveness of different source code representations for machine learning: traditionally used code metrics and code embeddings (code2vec, code2seq, and CuBERT).<br></p><p>We perform our experiments on the large-scale, manually labeled MLCQ dataset. We consider the binary classification problem – we classify the code samples as smelly or non-smelly and use the F1-measure of the minority (smell) class as a measure of performance. In our experiments, the ML classifier trained using CuBERT source code embeddings achieved the best performance for both God Class (F-measure of 0.53) and Long Method detection (F-measure of 0.75). With the help of a domain expert, we perform the error analysis to discuss the advantages of the CuBERT approach.<br></p><p>This study is the first to evaluate the effectiveness of pre-trained neural source code embeddings for code smell detection to the best of our knowledge. A secondary contribution of our study is the systematic evaluation of the effectiveness of multiple heuristic-based approaches on the same large-scale, manually labeled MLCQ dataset.<br></p>


2008 ◽  
Vol 26 (12) ◽  
pp. 3897-3912 ◽  
Author(s):  
A. D. DeJong ◽  
A. J. Ridley ◽  
C. R. Clauer

Abstract. During steady magnetospheric convection (SMC) events the magnetosphere is active, yet there are no data signatures of a large scale reconfiguration, such as a substorm. While this definition has been used for years it fails to elucidate the true physics that is occurring within the magnetosphere, which is that the dayside merging rate and the nightside reconnection rate balance. Thus, it is suggested that these events be renamed Balanced Reconnection Intervals (BRIs). This paper investigates four diverse BRI events that support the idea that new name for these events is needed. The 3–4 February 1998 event falls well into the classic definition of an SMC set forth by Sergeev et al. (1996), while the other challenge some previous notions about SMCs. The 15 February 1998 event fails to end with a substorm expansion and concludes as the magnetospheric activity slowly quiets. The third event, 22–23 December 2000, begins with a slow build up of magnetospheric activity, thus there is no initiating substorm expansion. The last event, 17 February 1998, is more active (larger AE, AL and cross polar cap potential) than previously studied SMCs. It also has more small scale activity than the other events studied here.


2015 ◽  
Vol 33 (3) ◽  
pp. 543-575 ◽  
Author(s):  
Lee B. Wilson

In 1706, Jamaica's provost marshal received a writ of escheat from the island's Supreme Court of Judicature. The writ directed him to empanel a jury of “Twelve and Lawful Men of the Neighbourhood” who would determine whether the slaves of James Whitchurch, a Jamaican merchant, should be escheated—returned—to the Crown. Did the “Negro Woman Slave Commonly Called Catalina” and her “Seaven Pickaninny” belong to Whitchurch, or could Queen Anne claim her prerogative right to an escheat because the previous owner of the slaves, Charles Delamaine, had died without an heir? The jury found in the Crown's favor, but a dissatisfied Whitchurch petitioned Queen Anne for relief, asking her to return the slaves and quiet his title. Whitchurch's petition, the first Jamaican escheat case to come before the Queen, sparked a transatlantic legal controversy as colonists, Assembly members, and imperial officials weighed the Crown's prerogative right to escheats against local political grievances and the Board of Trade's desire to encourage West Indian settlement and trade. This seemingly mundane conflict over property law quickly acquired constitutional significance, generating the kind of rights talk so familiar to early American historians: Jamaican colonists claimed the rights of Englishmen, and the Jamaican Assembly asserted an institutional capacity akin to Parliament. In this article, I contextualize colonists' rights talk, rooting their claims to English rights in concerns about the administration of property law during a crucial liminal moment in Jamaican history. As the colony transitioned from a small-scale to a large-scale plantation economy and from a society with slaves to a slave society, property and the law that governed it became the focus of intense political conflict.


Author(s):  
Selin Çağatay ◽  
Mia Liinason ◽  
Olga Sasunkevich

AbstractThis chapter lays out the theoretical foundation of the book. It conceptualizes resistance as a space in-between small-scale mundane practices with a low level of collective organizing and large-scale protest activities which often exemplify resistance in social movement studies. In line with feminist and queer conceptualization of resistance, the authors suggest to examine multi-scalarity of resistant practices. The chapter attends to three scales of feminist and LGBTI+  activism in Russia, Turkey, and Scandinavia. The first scale analyzes activism in relation to the civil society-state-market triad. The second scale problematizes the notion of solidarity in relations between feminist and LGBTI+  activists from different geopolitical regions and countries as well as between small- and large-scale activist organizations and groups. Finally, the third scale focuses on individual resistant practices and the role of individual bodies in emergence of collective political struggles.


2021 ◽  
Author(s):  
Aleksandar Kovačević ◽  
Jelena Slivka ◽  
Dragan Vidaković ◽  
Katarina-Glorija Grujić ◽  
Nikola Luburić ◽  
...  

<p>Code smells are structures in code that often have a negative impact on its quality. Manually detecting code smells is challenging and researchers proposed many automatic code smell detectors. Most of the studies propose detectors based on code metrics and heuristics. However, these studies have several limitations, including evaluating the detectors using small-scale case studies and an inconsistent experimental setting. Furthermore, heuristic-based detectors suffer from limitations that hinder their adoption in practice. Thus, researchers have recently started experimenting with machine learning (ML) based code smell detection. </p><p>This paper compares the performance of multiple ML-based code smell detection models against multiple traditionally employed metric-based heuristics for detection of God Class and Long Method code smells. We evaluate the effectiveness of different source code representations for machine learning: traditionally used code metrics and code embeddings (code2vec, code2seq, and CuBERT).<br></p><p>We perform our experiments on the large-scale, manually labeled MLCQ dataset. We consider the binary classification problem – we classify the code samples as smelly or non-smelly and use the F1-measure of the minority (smell) class as a measure of performance. In our experiments, the ML classifier trained using CuBERT source code embeddings achieved the best performance for both God Class (F-measure of 0.53) and Long Method detection (F-measure of 0.75). With the help of a domain expert, we perform the error analysis to discuss the advantages of the CuBERT approach.<br></p><p>This study is the first to evaluate the effectiveness of pre-trained neural source code embeddings for code smell detection to the best of our knowledge. A secondary contribution of our study is the systematic evaluation of the effectiveness of multiple heuristic-based approaches on the same large-scale, manually labeled MLCQ dataset.<br></p>


2020 ◽  
Vol 30 (08) ◽  
pp. 1591-1651 ◽  
Author(s):  
Nicola Bellomo ◽  
Richard Bingham ◽  
Mark A. J. Chaplain ◽  
Giovanni Dosi ◽  
Guido Forni ◽  
...  

This paper is devoted to the multidisciplinary modelling of a pandemic initiated by an aggressive virus, specifically the so-called SARS–CoV–[Formula: see text] Severe Acute Respiratory Syndrome, corona virus n.[Formula: see text]. The study is developed within a multiscale framework accounting for the interaction of different spatial scales, from the small scale of the virus itself and cells, to the large scale of individuals and further up to the collective behaviour of populations. An interdisciplinary vision is developed thanks to the contributions of epidemiologists, immunologists and economists as well as those of mathematical modellers. The first part of the contents is devoted to understanding the complex features of the system and to the design of a modelling rationale. The modelling approach is treated in the second part of the paper by showing both how the virus propagates into infected individuals, successfully and not successfully recovered, and also the spatial patterns, which are subsequently studied by kinetic and lattice models. The third part reports the contribution of research in the fields of virology, epidemiology, immune competition, and economy focussed also on social behaviours. Finally, a critical analysis is proposed looking ahead to research perspectives.


Sign in / Sign up

Export Citation Format

Share Document