previous discussion
Recently Published Documents


TOTAL DOCUMENTS

110
(FIVE YEARS 38)

H-INDEX

8
(FIVE YEARS 3)

Author(s):  
Alessio Porrino ◽  
Alessandro Volpi

This article aims at reflecting on the political significance of distinct conceptions of temporality and their symbolic representation in the work of Walter Benjamin. In particular, the “clock” and the “calendar” will be addressed as symbols of, respectively, a linear and homogeneous conception of time and of a cyclical, uneven – and potentially revolutionary – temporality. The conception of time symbolized by clocks is criticized by Benjamin as a bourgeois understanding of progress, which inhibits revolutionary tensions in society by shifting the political focus on future, on the inevitability of progress and growth; on the other hand, calendars’ and ancient cyclical festivals’ temporality constantly looks at the past, celebrating and re-actualizing the memory of previous revolutionary attempts. In the last section, the article will consider the role of symbols and allegories in Benjamin’s philosophical writing, casting new light on the previous discussion.


2022 ◽  
Vol 14 (2) ◽  
Author(s):  
Joshua Phillips

In the final months of her life, Virginia Woolf worked on two projects. One was the posthumously published novel Between the Acts (1941). The other was a literary-historical project, which she provisionally titled “Turning the Page” or “Reading at Random”, but which is now known by the dual titles “Anon” and “The Reader”. Although published in a 1979 eclectic edition, these documents have received little critical attention. This article proposes three novel approaches to this archive of documents. The first takes up the methodology proposed by Woolf’s original titles and reads a single folio of this project at random, paying close material attention to what is on both sides of Woolf’s typescript page. The second approach expands on the materialist slant of the first approach and offers an anatomy of this archive, while the third approach expands on my previous discussion of cataloging and classification, in order to sketch out a historiography of Woolf’s late archive.


Author(s):  
Toshiaki Makabe

Abstract In a high-frequency capacitively coupled plasma (HF-CCP), few studies have been carried out for the transport of charged particles in the active bulk plasma with high electronegativity. The electric field E(t), specifically, time-varying reduced field E(t)/Ng provides key knowledge about the characteristics of collisional bulk plasma. Numerical modeling is the only method for estimating E(t)/Ng, while a limited number of collision cross sections and related transport parameters are available. Under these circumstances, we discuss how to estimate the reduced field E(t)/Ng, i.e., E(t) in active bulk plasma with high electronegativity in HF-CCP through investigation of the correlation between the DC-critical reduced field (E/Ng)Crit: and the HF-effective reduced field (E(t)/Ng)eff . Our previous discussion on the correlation is validated by increasing the number of results of (E(t)/Ng)eff . The relation between the electronegativity and the ionization degree is derived from the sustainable condition in the bulk plasma.


2021 ◽  
Author(s):  
Fabio Mauri ◽  
Sara Cottler-Casanova ◽  
Matthias Cavassini ◽  
Marcel Stoeckle ◽  
Gilles Wandeler ◽  
...  

Abstract BackgroundFemale genital mutilation or cutting (FGM/C) is the practice of partial or total removal or injury of the external female genitalia for non-medical reasons. It has been documented in at least 30 countries and, as a result of migration, in high-income countries too. FGM/C causes various negative health complications, and may increase the risk of acquiring human immunodeficiency virus (HIV).Our study aims to generate descriptive statistics about FGM/C among HIV positive migrant women included in the Swiss HIV cohort study (SHCS).MethodsThe Swiss HIV Cohort study (www.SHCS.ch) is a national, prospective cohort study with ongoing community and hospital enrolment of HIV-positive individuals in Switzerland. Two questions on history of FGM/C and previous discussion about it with a healthcare professional were administered by treating infectious disease specialists during the 6-monthly routine visits occurring between June and December 2019. We included all women aged above 18 years, born in one of the 30 countries where FGM/C is prevalent, in care for an HIV-infection and recorded in the Swiss HIV Cohort Study.ResultsOur findings show that FMG/C is common (21%) in the SHCS female population originating from Africa. Such data may be largely underestimated given the 33.6% of non-respondents. The vast majority (70%) of the women reporting to have been cut had never discussed FGM/C with a health professional before the study.Conclusions FMG/C is common in the SHCS female population originating from Africa, but often overlooked by health professionals working with this population. FGM/C screening, diagnosis, care and prevention could be improved significantly through training and information.Trial registration: Not Applicable


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Ruixue Duan ◽  
Dan Li ◽  
Qiang Tong ◽  
Tao Yang ◽  
Xiaotong Liu ◽  
...  

Few-shot learning (FSL) is a core topic in the domain of machine learning (ML), in which the focus is on the use of small datasets to train the model. In recent years, there have been many important data-driven ML applications for intrusion detection. Despite these great achievements, however, gathering a large amount of reliable data remains expensive and time-consuming, or even impossible. In this regard, FSL has been shown to have advantages in terms of processing small, abnormal data samples in the huge application space of intrusion detection. FSL can improve ML for scarce data at three levels: the data, the model, and the algorithm levels. Previous knowledge plays an important role in all three approaches. Many promising methods such as data enrichment, the graph neural network model, and multitask learning have also been developed. In this paper, we present a comprehensive review of the latest research progress in the area of FSL. We first introduce the theoretical background to ML and FSL and then describe the general features, advantages, and main methods of FSL. FSL methods such as embedded learning, multitask learning, and generative models are applied to intrusion detection to improve the detection accuracy effectively. Then, the application of FSL to intrusion detection is reviewed in detail, including enriching the dataset by extracting intermediate features, using graph embedding and meta-learning methods to improve the model. Finally, the difficulties of this approach and its prospects for development in the field of intrusion detection are identified based on the previous discussion.


2021 ◽  
pp. 149-170
Author(s):  
Ann Whittle

In this chapter, a defence of the ability analysis of control proposed in chapter six is offered. The chapter begins by outlining some advantages of the analysis; briefly, not only does it explain the deep connection that appears to exist between freedom, moral responsibility, and the ability to do otherwise, it captures our judgements regarding moral responsibility in a wide range of tricky cases. The chapter then examines how to understand the ‘ceteris paribus’ clause in the ability analysis of control, and defends the proposed asymmetry between praise and blameworthy actions. By so doing, the chapter also ties the previous discussion of control more overtly to issues regarding moral responsibility.


2021 ◽  
pp. 1-9
Author(s):  
Patricia M. Thornton

Perhaps the most oft-quoted part of Xi Jinping's defiant 1st July speech marking the Party's centenary was his warning than any external forces attempting to “bully, oppress or subjugate” China will “dash their heads against the Great Wall of steel built with the flesh and blood of more than 1.4 billion Chinese people.” Foreign news organizations covering the ceremony also noted the “visual trick” of Xi's donning of a grey Mao suit identical to the one worn by the Great Helmsman in the portrait that hangs on Tiananmen, just feet below the rostrum from which Xi delivered his address; others doubted the functional significance of the five identical microphones, ascribing to them a very different significance. Xi's repeated references to the importance of Party history, however, drew far less attention in the Western press, although Xi gravely warned a cheering and flag-waving audience of more than 70,000 that while the CCP's original mission “is easy to define, ensuring that we stay true to this mission is a more difficult task.” By learning from history, we can understand why powers rise and fall. Through the mirror of history, we can find where we currently stand and gain foresight into the future. Looking back on the Party's 100-year history, we can see why we were successful in the past and how we can continue to succeed in the future. Indeed, in the months leading up to the centennial celebration, the Party launched a comprehensive campaign requiring CCP members to study the Party's past closely; A Short History of the Chinese Communist Party was revised and updated, eliminating a previous discussion of the consequences of the Great Leap Forward, which had concluded with the open acknowledgement that “This bitter historical lesson shouldn't be forgotten.” Also expunged was a frank evaluation of the excesses of the Cultural Revolution, which was replaced with an account that restricted its focus to highlighting various industrial, technological and diplomatic advances made over the course of that period, without acknowledging the social and political turmoil that accompanied those developments.


2021 ◽  
pp. 1-18
Author(s):  
Gregg Osborne
Keyword(s):  

Abstract Henry Allison’s interpretation of Kant’s First Analogy is among the most intriguing in the literature. Its virtues are considerable, but no previous discussion has done full justice to them. Nor has any previous discussion systematically explored the most important challenges to which it seems subject. This paper does both. Early sections provide a more thorough exegesis than is otherwise available and provide stronger textual backing than does Allison himself. Later sections turn to problems, most of which have not been raised by others. These problems, while serious, do not necessarily rule out the interpretation of Allison.


2021 ◽  
Vol 2 (2) ◽  
pp. 205-214
Author(s):  
Johan Oberlyn Simanjuntak ◽  
Bartholomeus ◽  
Salomo Simanjuntak ◽  
Partahi Lumbangaol ◽  
Astri Agnes

The contract is a very importand document in the project. Contract are seen as laws that must be obeyed, govern and control the rights and obligations between service users and service providers in the project. In world of construction in Indonesia, the standard used for contract documents must be based on Law No.2 of 2017 on construction services as a guide and guidance in constructions activities in Indonesia. In the international world, FIDIC documents has long been recognized, which is a contractual rule that has been used by many countries. FIDIC has also been widely adapted to government and private projects in Indonesia. The first analysis is to identify the contract documents used in several project in North Sumatera region. This analysis shows that the FIDIC red book document is the most suitable document to be used in several project in North Sumatera. The second analysis is comparing the FIDIC document and the analysis shows that the contract document that best matches the points in the questionnaired is Law No. 2 of 2017 on construction services. From the analysis of the previous discussion a conclusion was drawn regarding the philosophy of the work contract discussed was the type of unit price contract based on.


2021 ◽  
Vol 7 (2) ◽  
pp. 163
Author(s):  
Ali Mujahidin ◽  
Rika Pristian Fitri Astuti ◽  
Ifa Khoiria Ningrum

This study is a literature review with the normative approach. To achieve the desired objectives, the authors collected data consisting of primary and secondary data. The data obtained through the previous discussion of some theses, books, websites, supported by guidelines of the Qur�an and Al-Hadith. In gathering the data, the researcher uses the method of a documentary, and with the way the method of indirect observation, by visiting the library in search of data. The result of this research that Ibn Taimiyyah had two views in pricing, the first is valid pricing, second is invalid pricing. And valid pricing can be done by the government to stabilize the economic condition which is called intervention. The goal of intervention is to ensure social justice and prosperity of society. Intervention mechanisms are divided into two, namely direct and indirect. Direct intervention in the form of Al-Hisbah, the character of the institution as a corporate planner, set the market mechanism that is not fair. Besides, in the particular circumstances that required the intervention price, for example when there was war and famine, so all the high-priced goods, or when there was speculation in the market, which requires the seller to sell goods, or when there was speculation in the market, which requires the seller to sell goods with high price levels. While the indirect intervention was implemented in the educational problems and the fulfillment of public facilities such as transport and communication.


Sign in / Sign up

Export Citation Format

Share Document