We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Sleep value is the relative worth individuals assign to sleep. We previously found that individual differences in several sleep value subfactors relate to demographic, health, and sleep variables. Given the pivotal role values play in health behavior and the positive association between sleep value and sleep disturbance, individual differences in sleep value may influence vulnerability/resilience to sleep and circadian disturbance. This survey study (N=455) aimed to establish the latent factor structure of sleep value and identify whether sleep value profiles relate to demographic and sleep characteristics. Factor analysis on the Sleep Valuation Item Bank 2.0 identified five factors (wanting, prioritizing, devaluing, appreciating, and preferring). Latent profile analyses revealed five distinct sleep value profiles (unconcerned, appreciative, devalue, ambivalent priority, and concerned). Depression, sleep disturbance, and sleep-related impairment were highest among those who highly value sleep (concerned profile) and lowest among those who neither value nor devalue sleep (unconcerned profile). Findings suggest sleep value is a complex aspect of sleep health rather than a “more is better” construct and highlight that individual differences in sleep value profiles, may be associated with vulnerability/resilience to sleep disturbance.
Chapter 6 examines the Probo Koala environmental catastrophe which involved the dumping of toxic oil residue by the global trader Trafigura in the port of Abidjan in 2005. The development of the scandal into transnational litigation strategies in Britain and European capitals exposes the legal lumpiness fostered by the financialisation of global value chains. The ‘Ivorian miracle’ relied on protected economic integration within the global markets of coffee and cocoa. The dismantling of the ‘post-colonial block’ fostered a displacement of the terms of Côte d’Ivoire’s relationship with global markets. This contributed to reinforcing the prominence of global traders as intermediaries between states, financial markets and corporate power. It also consolidated the symbiotic relationship between the onshoring of offshore capitalism and the offshoring of onshore justice. The case demonstrates that corporate accountability gaps along global value chains are an outcome of the bifurcation of state sovereignty enabled by financial deregulation.
We analyzed the oxygen isotope composition of biogenic apatite phosphate (δ18Op) in fossil tooth enameloid to investigate the paleoecology of Late Cretaceous sharks in the Gulf Coastal Plain of Alabama, USA. We analyzed six different shark taxa from both the Mooreville Chalk and the Blufftown Formation. We compared shark δ18Op with the δ18Op of a co-occurring poikilothermic bony fish Enchodus petrosus as a reference for ambient conditions. Enchodus petrosus tooth enamel δ18Op values are similar between formations (21.3‰ and 21.4‰ Vienna Standard Mean Ocean Water [VSMOW], respectively), suggesting minimal differences in water δ18O between formations. Most shark taxa in this study are characterized by δ18Op values that overlap with E. petrosus values, indicating they likely lived in similar habitats and were also poikilothermic. Ptychodus mortoni and Cretoxyrhina mantelli exhibit significantly lower δ18Op values than co-occurring E. petrosus (P. mortoni δ18Op is 19.1‰ VSMOW in the Mooreville Chalk; C mantelli δ18Op is 20.2‰ VSMOW in the Mooreville Chalk and 18.1‰ VSMOW in the Blufftown Formation). Excursions into brackish or freshwater habitats and thermal water-depth gradients are unlikely explanations for the lower P. mortoni and C. mantelli δ18Op values. The low P. mortoni δ18Op value is best explained by higher body temperature relative to surrounding temperatures due to active heating (e.g., mesothermy) or passive heating due to its large body size (e.g., gigantothermy). The low C. mantelli δ18Op values are best explained by a combination of mesothermy (e.g., active heating) and migration (e.g., from the Western Interior Seaway, low-latitude warmer waters, or the paleo–Gulf Stream), supporting the hypothesis that mesothermy evolved in lamniform shark taxa during the Late Cretaceous. If the anomalous P. mortoni δ18Op values are also driven by active thermoregulation, this suggests that mesothermy evolved independently in multiple families of Late Cretaceous sharks.
Chapter 2 provides an overview of how emoticons and emojis are a human adaptation to online written conversation to compensate for the absence of non-verbal cues and physical context, but also an affordance of most written conversation to promote affiliation, creativity and play. The analysis highlights the role of emojis as ‘attendant activities’ (Jefferson, 1987) which express politeness (and impoliteness) and other pragmatic functions, including prosocial and anti-social behaviours, identities, contextualizations (physical/virtual), irony and meaning enhancement. By analysing the multiple, often overlapping interactional functions of emoticons and emojis, this chapter provides original insights into the unique role of emojis in children’s written conversation, highlighting some major differences between spoken and written interaction. Findings indicate that emojis fulfil interactional functions which go beyond simply replacing fundamental non-verbal, voice and contextual resources which are available to speakers in phone and face-to-face interaction. While further research in this area is required across different age groups and genders, the various categories of emojis identified in this chapter provide a comprehensive account of how children are likely to deploy and respond to these symbols in online interaction, and how multiple meanings are possible depending on the interactional context
In this chapter our goal is to determine the achievable region of the exponent pairs for the type-I and type-II error probabilities. Our strategy is to apply the achievability and (strong) converse bounds from Chapter 14 in conjunction with the large-deviations theory developed in Chapter 15. After characterizing the full tradeoff we will discuss an adaptive setting of hypothesis testing where, instead of committing ahead of time to testing on the basis of n samples, one can decide adaptively whether to request more samples or stop. We will find out that adaptivity greatly increases the region of achievable error exponents and will learn about the sequential probability ratio test (SPRT) of Wald. In the closing sections we will discuss relations to more complicated settings in hypothesis testing: one with composite hypotheses and one with communication constraints.
Following Jasanoff and Kim’s concept of “sociotechnical imaginaries,” this chapter examines the rhetoric, regulatory frameworks and policies employed in constructing imaginaries of digital sovereignty in China, Russia, and India – three member countries of BRICS and the SCO (Shanghai Cooperation Organisation). A central finding is that these sociotechnical imaginaries center on protecting national cultural identity, or “cultural sovereignty,” against the “free flow of information,” a motive echoing NWICO debates in the 1970s and 1980s and WSIS discussions in the early 2000s. The development of these countries’ digital sovereignty imaginaries is deduced from their unique histories and governance approaches. Furthermore, the SCO’s crucial role as a platform to promote the partly authoritarian Chinese conception of cyber/information sovereignty is demonstrated. Another key finding is that imaginaries of digital sovereignty relate to a non-secular understanding of the state in all three examined countries. In this sense, the global emergence of digital sovereignty is comparable to the evolution of Westphalian sovereignty from the confessional wars in early modern Europe. The chapter concludes that an informed debate on digital sovereignty must consider both the dangers of digital authoritarianism and the productive potential of digital decolonization.
This paper introduces a novel fiber-based picosecond burst-mode laser system capable of operating at high power and high repetition rates. A pulse-circulating fiber ring was developed as a burst generator, achieving an intra-burst repetition rate of 469 MHz without the need for a high-repetition-rate seed source. This design also allows for flexible adjustment of the number of sub-pulses, burst repetition rate and burst shape. In addition, a master oscillator power amplifier was employed to analyze the amplification characteristics of bursts. The system demonstrated a maximum average power of 606 W, with a measured sub-pulse duration of 62 ps and the highest sub-pulse peak power of 980 kW. To the best of our knowledge, this marks the highest average power obtained in burst-mode ultrafast lasers. Such a laser system holds potential for applications in precision manufacturing, high-speed imaging, high-precision ranging and other diverse domains.
There is a particular type of literature that sees empire as a nobler version of an Indiana Jones adventure. This literature suggests that British colonials were responsible for the ‘discovery’ and ‘return’ of India's Buddhist heritage. Charles Allen, for example, criticized Edward Said and scholars influenced by his important theoretical intervention Orientalism for failing to ask ‘where we would be without the Orientalists’. The orientalists, a particular breed of East India Company official-cum-adventurer-cum-scholars, ‘initiated the recovery of South Asia's lost past’ and ‘the European discovery of Buddhism and the subsequent resurgence of Buddhism in South Asia arose directly out of their activities’. British efforts to find, unearth, translate, collect and legislate around Buddhist material culture and India's built and literary heritage make for a fascinating story. However, to draw a direct line between British archaeology of Buddhist sites and the resurgence of Buddhism in modern South Asia as yet another instance of the great gifts of colonialism to India is to intentionally ignore the very considerable interventions, efforts, creativity and intellectual engagement of a range of Buddhists from not just the Indian subcontinent but further afield, from among Buddhist communities in Southeast and East Asia. It is one thing to dig up a site and write about it in an elite journal. It is quite another to undertake long and difficult pilgrimages in the 19th and early 20th centuries in order to bring these sites alive, as places of Buddhist worship and practice. This latter work was done by largely South, East and Southeast Asian Buddhists. If there is a story of the return of the Buddha, it is these actors who played the main role. And it is these actors whose efforts constitute what is clearly still a hidden history of modern Buddhism in India.
Not that the colonial context was unimportant, as mentioned earlier. The 19th-century transport revolution played a critical role in facilitating the movement of people at scale. Expanding shipping lines, the ever-growing railways, improved communications and dissemination of information about pilgrimage sites via print all contributed to an enormous expansion of pilgrimage, especially international pilgrimage, from the 1890s onwards. Mobility was at the heart of modern Asia's colonial history.
Risk-based surveillance is now a well-established paradigm in epidemiology, involving the distribution of sampling efforts differentially in time, space, and within populations, based on multiple risk factors. To assess and map the risk of the presence of the bacterium Xylella fastidiosa, we have compiled a dataset that includes factors influencing plant development and thus the spread of such harmful organism. To this end, we have collected, preprocessed, and gathered information and data related to land types, soil compositions, and climatic conditions to predict and assess the probability of risk associated with X. fastidiosa in relation to environmental features. This resource can be of interest to researchers conducting analyses on X. fastidiosa and, more generally, to researchers working on geospatial modeling of risk related to plant infectious diseases.
This chapter considers gender dynamics within the new Pentecostal churches and the role of young women within them. It explores Pentecostal gender constructions and how they conflict with the RPF’s more ‘progressive’ gender policies. The chapter foregrounds young women’s timework and how their actions are oriented towards leaving a Christian legacy for imagined heirs in the future. Here legacy is related to notions of urwibutso (memorial), with the concept taking on new meanings in Pentecostal churches. This chapter continues the discussion of Christian ubwenge, arguing that it becomes particularly important for young Pentecostal women.
To assess the post-earthquake trauma and hopelessness levels of nursing students due to the earthquakes that occurred on February 6, 2023.
Methods
This study was conducted between April and May 2023 in the Nursing Department in a province located in Southeastern Türkiye using the face-to-face interview technique. The study was completed with 276 students in line with the power analysis. The data were collected using a questionnaire, the Scale that Determines the Level of Post-Earthquake Trauma (SDLPET), and the Beck Hopelessness Scale (BHS).
Results
The mean SDLPET and BHS scores of the students were 55.45±13.58 and 9.38±4.53, respectively. Some 12.3% of the nursing students lost their friends due to the earthquake, 80.4% did not receive any earthquake training, 46% needed psychological support, 48.6% needed financial support, 49.6% needed social support, 37% had sleep problems, 72.8% experienced hopelessness, and the quality of life of 67.8% of the students was negatively affected due to the hopelessness they experienced.
Conclusions
It was found that the level of post-earthquake trauma and hopelessness of the students was moderate, and a positive and significant correlation was found between trauma and hopelessness scores.
This chapter canvasses coalitions for and against pluralism that emerged with the foundation of the Republic of Turkey. It shows that while the early nation-builders pursued a unitary, ethno-nationalist project, Kemalism also entailed an “embedded liberalism” inherited from late Ottoman modernization, including resources for eventual democratization. Throughout the twentieth century, political actors sought to mobilize these resources toward pluralizing the political system across a series of critical junctures (e.g., the 1920s’ cultural revolution; the 1950 transition to multiparty democracy; successive coups in 1960, 1971, and 1980; and a 1997 “postmodern coup.”) Across these junctures, the chapter argues, there were only two pronounced periods of secularist/Islamist cleavages. More often, conflict was driven by significant, cross-camp cooperation and intra-camp rivalry. Tracing when and why pluralizing and anti-pluralist alignments succeeded or failed, the chapter captures a key dynamic: the installation of an ethno(-religious nationalist project – the Turkish-Islamic Synthesis (TIS) – as national project, even as ideas and actors invested in pluralization continued to mobilize.
Word Grammar is a linguistic theory which best known as a variant of Dependency Grammar. However, it has a number of other properties, and its architectural assumptions are consistent with its theory of how human cognition works and its theory of how representations work. In this chapter we relate Word Grammar (WG) to a number of different trends in linguistic theorising and explain the various traditions that the theory belongs to. Word Grammar belongs in three main theoretical traditions: Dependency Grammars, Constraint-based Grammars and Cognitive Linguistics. We show how WG relates to these approaches and explore how the network model of linguistic representation adopted by WG relates to each tradition. The key claim of WG is that language is represented in a symbolic network, which is part of a more general human cognitive network and which is in a relationship with a discreet neural network.