278 research outputs found

    Water Funds: Conserving Green Infrastructure

    Get PDF
    This manual is an effort by TNC to compile, analyze and synthesize its own experience, together with that of the water funds already in existence and under creation, in order to provide operational guidelines to people and organizations interested in establishing a water fund or similar mechanism. Each location has different ecological, social, economic, legal and institutional features and, therefore, each water fund will have its own characteristics, phases and projections. This manual presents general guidelines and logical steps that must be followed to boost the opportunities and benefits of a water fund and to minimize possible obstacles for its creation. It is not intended to be an in-depth look at every aspect of water funds. Although TNC participates in several other initiatives and similar approaches to watershed management, such as the water producers program in Brazil, this document will not address those initiatives and will only focus on the water funds scheme, placing greater emphasis on experiences in the Andean region

    Information Escrows

    Get PDF
    A variety of information escrows - including allegation escrows, suspicion escrows, and shared-interest escrows - hold the promise of reducing the first-mover disadvantage that can deter people with socially valuable private information from disclosing that information to others. Information escrows allow people to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. For example, an allegation escrow for sexual harassment might allow a victim to place a private complaint into escrow with instructions that the complaint be lodged with the proper authorities only if the escrow agent receives at least one additional allegation against the same individual. We assess the benefits and costs of allegation escrows and discuss how they might be applied to a variety of claims, including sexual harassment, date rape, adultery, and corporate and public whistleblowing. We also show how analogous shared-interest escrows might be used in workplace dating and adoption contexts to facilitate the discovery of parties\u27 mutual interest when unintermediated expressions of interest might themselves be harassing

    Triggers And Tweets: Implicit Aspect-Based Sentiment And Emotion Analysis Of Community Chatter Relevant To Education Post-Covid-19

    Get PDF
    This research proposes a well-being analytical framework using social media chatter data. The proposed framework infers analytics and provides insights into the public\u27s well-being relevant to education throughout and post the COVID-19 pandemic through a comprehensive Emotion and Aspect-based Sentiment Analysis (ABSA). Moreover, this research aims to examine the variability in emotions of students, parents, and faculty toward the e-learning process over time and across different locations. The proposed framework curates Twitter chatter data relevant to the education sector, identifies tweets with the sentiment, and then identifies the exact emotion and emotional triggers associated with those feelings through implicit ABSA. The produced analytics are then factored by location and time to provide more comprehensive insights that aim to assist the decision-makers and personnel in the educational sector enhance and adapt the educational process during and following the pandemic and looking toward the future. The experimental results for emotion classification show that the Linear Support Vector Classifier (SVC) outperformed other classifiers in terms of overall accuracy, precision, recall, and F-measure of 91%. Moreover, the Logistic Regression classifier outperformed all other classifiers in terms of overall accuracy, recall, an F-measure of 81%, and precision of 83% for aspect classification. In online experiments using UAE COVID-19 education-related data, the analytics show high relevance with the public concerns around the education process that were reported during the experiment\u27s timeframe

    Data integration for the analysis of uncharacterized proteins in Mycobacterium tuberculosis

    Get PDF
    Includes abstract.Includes bibliographical references (leaves 126-150).Mycobacterium tuberculosis is a bacterial pathogen that causes tuberculosis, a leading cause of human death worldwide from infectious diseases, especially in Africa. Despite enormous advances achieved in recent years in controlling the disease, tuberculosis remains a public health challenge. The contribution of existing drugs is of immense value, but the deadly synergy of the disease with Human Immunodeficiency Virus (HIV) or Acquired Immunodeficiency Syndrome (AIDS) and the emergence of drug resistant strains are threatening to compromise gains in tuberculosis control. In fact, the development of active tuberculosis is the outcome of the delicate balance between bacterial virulence and host resistance, which constitute two distinct and independent components. Significant progress has been made in understanding the evolution of the bacterial pathogen and its interaction with the host. The end point of these efforts is the identification of virulence factors and drug targets within the bacterium in order to develop new drugs and vaccines for the eradication of the disease

    LIPIcs, Volume 277, GIScience 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 277, GIScience 2023, Complete Volum

    Static search games played over graphs and general metric spaces

    Get PDF
    We define a general game which forms a basis for modelling situations of static search and concealment over regions with spatial structure. The game involves two players, the searching player and the concealing player, and is played over a metric space. Each player simultaneously chooses to deploy at a point in the space; the searching player receiving a payoff of 1 if his opponent lies within a predetermined radius r of his position, the concealing player receiving a payoff of 1 otherwise. The concepts of dominance and equivalence of strategies are examined in the context of this game, before focusing on the more specific case of the game played over a graph. Methods are presented to simplify the analysis of such games, both by means of the iterated elimination of dominated strategies and through consideration of automorphisms of the graph. Lower and upper bounds on the value of the game are presented and optimal mixed strategies are calculated for games played over a particular family of graphs

    Deep Learning Methods for Remote Sensing

    Get PDF
    Remote sensing is a field where important physical characteristics of an area are exacted using emitted radiation generally captured by satellite cameras, sensors onboard aerial vehicles, etc. Captured data help researchers develop solutions to sense and detect various characteristics such as forest fires, flooding, changes in urban areas, crop diseases, soil moisture, etc. The recent impressive progress in artificial intelligence (AI) and deep learning has sparked innovations in technologies, algorithms, and approaches and led to results that were unachievable until recently in multiple areas, among them remote sensing. This book consists of sixteen peer-reviewed papers covering new advances in the use of AI for remote sensing

    Seducing the Target: Sexual Intercourse as Outrageous Government Conduct

    Get PDF

    Legal Factors in the Acquisition of a United State Corporation: Litigation by Hostile Targets

    Full text link
    Acquisitions of United States corporations have become increasingly complex takeover contests, where bidders and target corporations are forced into offensive and defensive litigation strategies to protect their respective interests. Targets often assert that the bidders have violated federal or state securities laws, federal antitrust laws, federal margin regulations, federal and state regulatory systems, and federal anti-racketeering laws. These lawsuits are primarily based on the principal federal regulation of takeovers in section 14(a) of the Securities and Exchange Act of 1934 and the Williams Act. Target litigation is customary, but entails certain disadvantages; a lawsuit rarely stops an offer, is expensive, and often generates counter litigation by the bidder. This paper analyzes the use of such litigation by target company managements. This paper asks questions such as why target managers sue, whether or not the lawsuits are effective, and who benefits from these suits
    corecore