Name Authority Data and Its Model for Non-Latin Representations With
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Introduction to the Chinese Naming Tradition of Both Ming and Zi
ǂãϒZƜ 100 ě 12 , 101 Ȃ 167-188 ÚɅjΩôȖď Ȭ®d Οɳ1Zķ͵:ɓI ͻ:, Ŵ Ů ΚɎ˚ΚɎ˚jjjˆôˆôˆôϜďϜďϜďôďΚôďΚôďΚ 167 An Introduction to the Chinese Naming Tradition of Both Ming and Zi Chun-Ping Hsieh Associate Professor of General Education Center National Defense University Abstract Since ancient times, the Chinese have paid high respect to their own full names. A popular saying goes: “While sitting on the seat (or staying at the homeland), one never changes one’s surname; while walking on the road (or traveling abroad), one never changes one’s given name.” To the Chinese, a kind of sacredness lies so definitely in everyone’s name. The surname signifies the continuity of his lineage, whereas the personal name ming signifies blessings bestowed by the parents. A model gentleman of Chinese gentry, jun zi, means a person who conscientiously devotes himself to a virtuous and candid life so as symbolically not only to keep his name from being detained but also to glorify his parents as well as the lineage ancestors. To our surprise, however, the Chinese of traditional elite gentry would adopt, in addition, a courtesy name, zi, at the age of twenty. To avoid deviating from the sense of filial piety, the meaning of this courtesy name must evoke a response to that of the primary personal name. The present paper will thus focus on the strategic naming of zi as ingenious responses to ming, which discloses the most astonishingly wonderful wisdom in the art of Chinese naming. In the first place, we must understand that the need of zi cannot be separated from the address etiquette with which the Chinese of traditional hierarchical society were greatly concerned. -
ISO/TC46 (Information and Documentation) Liaison to IFLA
ISO/TC46 (Information and Documentation) liaison to IFLA Annual Report 2015 TC46 on Information and documentation has been leading efforts related to information management since 1947. Standards1 developed under ISO/TC46 facilitate access to knowledge and information and standardize automated tools, computer systems, and services relating to its major stakeholders of: libraries, publishing, documentation and information centres, archives, records management, museums, indexing and abstracting services, and information technology suppliers to these communities. TC46 has a unique role among ISO information-related committees in that it focuses on the whole lifecycle of information from its creation and identification, through delivery, management, measurement, and archiving, to final disposition. *** The following report summarizes activities of TC46, SC4, SC8 SC92 and their resolutions of the annual meetings3, in light of the key-concepts of interest to the IFLA community4. 1. SC4 Technical interoperability 1.1 Activities Standardization of protocols, schemas, etc. and related models and metadata for processes used by information organizations and content providers, including libraries, archives, museums, publishers, and other content producers. 1.2 Active Working Group WG 11 – RFID in libraries WG 12 – WARC WG 13 – Cultural heritage information interchange WG 14 – Interlibrary Loan Transactions 1.3 Joint working groups 1 For the complete list of published standards, cfr. Appendix A. 2 ISO TC46 Subcommittees: TC46/SC4 Technical interoperability; TC46/SC8 Quality - Statistics and performance evaluation; TC46/SC9 Identification and description; TC46/SC 10 Requirements for document storage and conditions for preservation - Cfr Appendix B. 3 The 42nd ISO TC46 plenary, subcommittee and working groups meetings, Beijing, June 1-5 2015. -
Prioritizing African Languages: Challenges to Macro-Level Planning for Resourcing and Capacity Building
Prioritizing African Languages: Challenges to macro-level planning for resourcing and capacity building Tristan M. Purvis Christopher R. Green Gregory K. Iverson University of Maryland Center for Advanced Study of Language Abstract This paper addresses key considerations and challenges involved in the process of prioritizing languages in an area of high linguistic di- versity like Africa alongside other world regions. The paper identifies general considerations that must be taken into account in this process and reviews the placement of African languages on priority lists over the years and across different agencies and organizations. An outline of factors is presented that is used when organizing resources and planning research on African languages that categorizes major or crit- ical languages within a framework that allows for broad coverage of the full linguistic diversity of the continent. Keywords: language prioritization, African languages, capacity building, language diversity, language documentation When building language capacity on an individual or localized level, the question of which languages matter most is relatively less complicated than it is for those planning and providing for language capabilities at the macro level. An American anthropology student working with Sierra Leonean refugees in Forecariah, Guinea, for ex- ample, will likely know how to address and balance needs for lan- guage skills in French, Susu, Krio, and a set of other languages such as Temne and Mandinka. An education official or activist in Mwanza, Tanzania, will be concerned primarily with English, Swahili, and Su- kuma. An administrator of a grant program for Less Commonly Taught Languages, or LCTLs, or a newly appointed language authori- ty for the United States Department of Education, Department of Commerce, or U.S. -
Korean Criminal Law Under Controversy After Democratization 49
Korean Criminal Law under Controversy after Democratization 49 Korean Criminal Law under Controversy after Democratization Cho Kuk* This Article reviews what democratization has brought and what has remained intact in Korean criminal law, focusing on the change of three Korean criminal special acts under hot debate such as the National Security Act, the Security Surveillance Act, and the Social Protection Act after democ- ratization. Then it examines the newly surfacing issues of Korean criminal law, focusing on the moralist and male-oriented biases. Keywords: criminal law, National Security Act, Security Surveillance Act, Social Protection Act, adultery, rape, homicide of lineal ascendants 1. Introduction The nationwide June Struggle of 1987 led to the collapse of Korea’s authori- tarian regime and opened a road toward democratization.1 Under the authoritari- an regime, the Constitution’s Bill of Rights was merely nominal, and criminal law and procedure were no more than instruments for maintaining the regime and suppressing the dissidents. It was not a coincidence that the June Struggle was sparked by the death of a dissident student tortured during police interroga- * Assistant Professor of Law, Seoul National University College of Law, Korea. 1. For information regarding the June Struggle, see West, James M. & Edward J. Baker, 1991. “The 1987 Constitutional Reforms in South Korea: Electoral Processes and Judicial Independence”, in Human Rights in Korea: Historical and Policy Perspectives (Harvard University Press, 1991): 221. The Review of Korean Studies Vol. 6, No. 2 (49-65) © 2003 by The Academy of Korean Studies 50 The Review of Korean Studies tion.2 Democratization brought a significant change in the Korean criminal law and procedure.3 Criminal law was a symbol of authoritarian rule in Korea. -
Girl Power: Feminine Motifs in Japanese Popular Culture David Endresak [email protected]
Eastern Michigan University DigitalCommons@EMU Senior Honors Theses Honors College 2006 Girl Power: Feminine Motifs in Japanese Popular Culture David Endresak [email protected] Follow this and additional works at: http://commons.emich.edu/honors Recommended Citation Endresak, David, "Girl Power: Feminine Motifs in Japanese Popular Culture" (2006). Senior Honors Theses. 322. http://commons.emich.edu/honors/322 This Open Access Senior Honors Thesis is brought to you for free and open access by the Honors College at DigitalCommons@EMU. It has been accepted for inclusion in Senior Honors Theses by an authorized administrator of DigitalCommons@EMU. For more information, please contact lib- [email protected]. Girl Power: Feminine Motifs in Japanese Popular Culture Degree Type Open Access Senior Honors Thesis Department Women's and Gender Studies First Advisor Dr. Gary Evans Second Advisor Dr. Kate Mehuron Third Advisor Dr. Linda Schott This open access senior honors thesis is available at DigitalCommons@EMU: http://commons.emich.edu/honors/322 GIRL POWER: FEMININE MOTIFS IN JAPANESE POPULAR CULTURE By David Endresak A Senior Thesis Submitted to the Eastern Michigan University Honors Program in Partial Fulfillment of the Requirements for Graduation with Honors in Women's and Gender Studies Approved at Ypsilanti, Michigan, on this date _______________________ Dr. Gary Evans___________________________ Supervising Instructor (Print Name and have signed) Dr. Kate Mehuron_________________________ Honors Advisor (Print Name and have signed) Dr. Linda Schott__________________________ Dennis Beagan__________________________ Department Head (Print Name and have signed) Department Head (Print Name and have signed) Dr. Heather L. S. Holmes___________________ Honors Director (Print Name and have signed) 1 Table of Contents Chapter 1: Printed Media.................................................................................................. -
Identity Under Japanese Occupation
1 “BECOMING JAPANESE:” IDENTITY UNDER JAPANESE OCCUPATION GRADES: 9-12 AUTHOR: Katherine Murphy TOPIC/THEME: Japanese Occupation, World War II, Korean Culture, Identity TIME REQUIRED: Two 60-minute periods BACKGROUND: The lesson is based on the impact of the Japanese occupation of Korea during World War II on Korean culture and identity. In particular, the lesson focuses on the Japanese campaign in 1940 to encourage Koreans to abandon their Korean names and adopt Japanese names. This campaign was known as “sōshi-kaimei." The purpose of this campaign, along with campaigns requiring Koreans to recite an oath to the Japanese Emperor and bow at Shinto shrines, were to make the Korean people “Japanese” and hopefully, loyal subjects of the Japanese Empire by abandoning their Korean identity and loyalties. These cultural policies and campaigns were key to the Japanese war effort during World War II. The lesson draws from the students’ lives as well as two books: Lost Names: Scenes from a Korean Boyhood by Richard E. Kim and Under the Black Umbrella: Voices from Colonial Korea 1910-1945 by Hildi Kang. CURRICULUM CONNECTION: The lesson is intended to use the major themes from the summer reading book Lost Names: Scenes from a Korean Boyhood to introduce students to one of the five essential questions of the World History II course: How is identity constructed? How does identity impact human experience? In first investigating the origin of their own names and the meaning of Korean names, students can begin to explore the question “How is identity constructed?’ In examining how and why the Japanese sought to change the Korean people’s names, religion, etc during World War II, students will understand how global events such as World War II can impact an individual. -
Sunspec Plant Information Exchange
Document #: 12042 Status: DRAFT Version D6 SunSpec Plant Information Exchange SunSpec Alliance Interoperability Specification SunSpec Alliance Plant Extract Document Workgroup Brett Francis, Bob Fox, Ferdy Nagy, Paul Cobb, Michael Palmquist, Jose Gomez, Stephen Lapointe, John Nunneley, Terry Terasammal, Francisco Ancin, Beth McCanlies Draft 6 ABSTRACT The SunSpec Specification suite consists of the following documentation: - SunSpec Technology Overview - SunSpec Information Model Specifications - SunSpec Model Data Exchange - SunSpec Plant Information Exchange This is the Plant Information Exchange document. A Plant Information Exchange standard enables these functions: • A common monitoring extract format for asset analysis tools • A means to extract and send historic plant data between different monitoring systems • A way to report asset performance to financial partners, for plants managed by different monitoring systems Change History D-1: Initial (A) Draft – Brett Francis : 2012-May-23 D-1: B Draft – workgroup 2012-May-31 and 2012-June-7, Brett Francis : 2012-Jun-12 D-1: C Draft – Additional elements and grammar improvements – Brett Francis : 2012-Jun-13 D-1: D Draft – workgroup 2012-June-28 – plant, sunSpecMetadata and strings blocks D-1: E Draft – workgroup 2012-July-05 – intro update, participant block, enumerated types – Brett Francis : 2012-Jul-18 D-1: F Draft – John Nunneley input 2012-Aug-09 T-1: A – Promoted to TEST level 1.0 – John Nunneley 2012-Aug-09 T-1: B – General formatting, layout and grammar improvements – Brett Francis 2012-Sept-05 T-2:A – Incorporating feedback – 2012-MMM-dd V2-D1: Flesh out financial oversight use case and NREL requirements. 2013-Feb-14 V2-D2: Incorporate feedback. -
WG1 Terminology Work of IEC Syc on Smart City Systems
WG1 Terminology Work of IEC SyC on Smart City Systems Dr. Xiaomi An, Professor at Renmin University of China Convener of WG1, IEC SyC on Smart Cities January 14, 2019, Seoul, Korea Third ITU Workshop on Data Processing and Management for IoT and Smart Cities and Communities INTERNATIONAL ELECTROTECHNICAL COMMISSION Outline • Members of the WG1 • The stages of work of WG1 • The work plan of WG1 • Joint work of WG1 with ISO and ITU • An Integrated methodology frameworks for smart city system concept system building: common concerns of SDOs • An integrated methodology framework for smart city system concept system building: applications to the two NWIPs Members of the WG1 • 35 experts • 11 countries – China 8 – US 7 – India 5 – Korea 4 – RU 4 – GB 2 – CH 1 – DE 1 – JP 1 – SE 1 – ZA 1 Vocabulary NWIP, November 16, 2018 WD, December 11, 2018 Smart City System- Methodology for concepts and taxonomies building: Justification it as an IS, February 12, 2018// Methodology for terminology work and concept system building: an overview, April 20, 2018// Existing concept models of smart city systems from standards developers, May 20, 2018// Concept System Building for Smart City System: Methodology Studies in Progress, June 9, Methodology NWIP, 2018// November 16, 2018 Recommendations for US WD, December meeting, June 26, 2018 2018 Project team of Vocabulary Chair: Xiaomi An Experts: from 6 countries Experts: Document SyCSmartCities/50/NP Country: CH First name Last name Email Alexander Samarin [email protected] Country: CN First name Last -
Volume 11 JNCOLCTL Final Online.Pdf
Journal of the National Council of Less Commonly Taught Languages Vol. 11 Spring, 2012 Danko Šipka, Editor Antonia Schleicher, Managing Editor Charles Schleicher, Copy Editor Nyasha Gwaza, Production Editor Kevin Barry, Production Assistant The development of the Journal of the National Council of Less Commonly Taught Languages is made possible in part through a grant from the U.S. Department of Education Please address enquiries concerning advertising, subscriptions and issues to the NCOLCTL Secretariat at the following address: National African Language Resource Center 4231 Humanities Building, 455 N. Park St., Madison, WI 53706 Copyright © 2012, National Council of Less Commonly Taught Languages (NCOLCTL) iii The Journal of the National Council of Less Commonly Taught Languages, published annually by the Council, is dedicated to the issues and concerns related to the teaching and learning of Less Commonly Taught Languages. The Journal primarily seeks to address the interests of language teachers, administrators, and researchers. Arti- cles that describe innovative and successful teaching methods that are relevant to the concerns or problems of the profession, or that report educational research or experimentation in Less Commonly Taught Languages are welcome. Papers presented at the Council’s annual con- ference will be considered for publication, but additional manuscripts from members of the profession are also welcome. Besides the Journal Editor, the process of selecting material for publication is overseen by the Advisory Editorial Board, which con- sists of the foremost scholars, advocates, and practitioners of LCTL pedagogy. The members of the Board represent diverse linguistic and geographical categories, as well as the academic, government, and business sectors. -
OASIS AMQP Version 1.0
OASIS AMQP Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 21 February 2012 Specification URIs This version: http://docs.oasis-open.org/amqp/core/v1.0/csprd01/amqp-core-overview-v1.0-csprd01.xml (Authoritative) http://docs.oasis-open.org/amqp/core/v1.0/csprd01/amqp-core-overview-v1.0-csprd01.html http://docs.oasis-open.org/amqp/core/v1.0/csprd01/amqp-core-complete-v1.0-csprd01.pdf Previous version: N/A Latest version: http://docs.oasis-open.org/amqp/core/v1.0/amqp-core-overview-v1.0.xml (Authoritative) http://docs.oasis-open.org/amqp/core/v1.0/amqp-core-overview-v1.0.html http://docs.oasis-open.org/amqp/core/v1.0/amqp-core-complete-v1.0.pdf Technical Committee: OASIS AMQP Technical Committee Chairs: Ram Jeyaraman ([email protected]), Microsoft Angus Telfer ([email protected]), INETCO Systems Editors: Robert Godfrey ([email protected]), JPMorgan Chase & Co. David Ingham ([email protected]), Microsoft Rafael Schloming ([email protected]), Red Hat Additional artifacts: This specification consists of the following documents: • Part 0: Overview - Overview of the AMQP specification [xml] [html] • Part 1: Types - AMQP type system and encoding [xml] [html] • Part 2: Transport - AMQP transport layer [xml] [html] • Part 3: Messaging - AMQP Messaging Layer [xml] [html] • Part 4: Transactions - AMQP Transactions Layer [xml] [html] • Part 5: Security - AMQP Security Layers [xml] [html] • XML Document Type Definition (DTD) Related work: This specification replaces or supersedes: • http://www.amqp.org/specification/1.0/amqp-org-download Abstract: The Advanced Message Queuing Protocol (AMQP) is an open internet protocol for business messaging. -
Vietnamese Style Guide
Vietnamese Style Guide Contents What's New? .................................................................................................................................... 4 New Topics ................................................................................................................................... 4 Updated Topics ............................................................................................................................ 4 Introduction ...................................................................................................................................... 5 About This Style Guide ................................................................................................................ 5 Scope of This Document .............................................................................................................. 5 Style Guide Conventions .............................................................................................................. 5 Sample Text ................................................................................................................................. 5 Recommended Reference Material ............................................................................................. 6 Normative References .............................................................................................................. 7 Informative References ............................................................................................................ -
China Versus Vietnam: an Analysis of the Competing Claims in the South China Sea Raul (Pete) Pedrozo
A CNA Occasional Paper China versus Vietnam: An Analysis of the Competing Claims in the South China Sea Raul (Pete) Pedrozo With a Foreword by CNA Senior Fellow Michael McDevitt August 2014 Unlimited distribution Distribution unlimited. for public release This document contains the best opinion of the authors at the time of issue. It does not necessarily represent the opinion of the sponsor. Cover Photo: South China Sea Claims and Agreements. Source: U.S. Department of Defense’s Annual Report on China to Congress, 2012. Distribution Distribution unlimited. Specific authority contracting number: E13PC00009. Copyright © 2014 CNA This work was created in the performance of Contract Number 2013-9114. Any copyright in this work is subject to the Government's Unlimited Rights license as defined in FAR 52-227.14. The reproduction of this work for commercial purposes is strictly prohibited. Nongovernmental users may copy and distribute this document in any medium, either commercially or noncommercially, provided that this copyright notice is reproduced in all copies. Nongovernmental users may not use technical measures to obstruct or control the reading or further copying of the copies they make or distribute. Nongovernmental users may not accept compensation of any manner in exchange for copies. All other rights reserved. This project was made possible by a generous grant from the Smith Richardson Foundation Approved by: August 2014 Ken E. Gause, Director International Affairs Group Center for Strategic Studies Copyright © 2014 CNA FOREWORD This legal analysis was commissioned as part of a project entitled, “U.S. policy options in the South China Sea.” The objective in asking experienced U.S international lawyers, such as Captain Raul “Pete” Pedrozo, USN, Judge Advocate Corps (ret.),1 the author of this analysis, is to provide U.S.