A Short Survey on Riot Prediction Koushik Deb, Arpita Konar, Kousheya Das, Mrityunjoy Sen

Total Page:16

File Type:pdf, Size:1020Kb

A Short Survey on Riot Prediction Koushik Deb, Arpita Konar, Kousheya Das, Mrityunjoy Sen A Short Survey on Riot Prediction Koushik Deb, Arpita Konar, Kousheya Das, Mrityunjoy Sen To cite this version: Koushik Deb, Arpita Konar, Kousheya Das, Mrityunjoy Sen. A Short Survey on Riot Prediction. 2021. hal-03245310 HAL Id: hal-03245310 https://hal.archives-ouvertes.fr/hal-03245310 Preprint submitted on 1 Jun 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A Short Survey on Riot Prediction Koushik Deb Arpita Konar Kousheya Das Mrityunjoy Sen Institute of Engineering and Institute of Engineering Institute of Engineering Institute of Engineering Management and Management and Management and Management [email protected] [email protected] [email protected] [email protected] ABSTRACT It has been observed that there has been increased demand in real-world event detection using publicly accessible data through various social platforms such as Twitter, YouTube, or Facebook. By applying social media intelligence for detection and identification of any civil or secular turmoil-oriented ultimatum is an important field of interest for researchers for the last few decades. Several researchers have come up with various integrated event detection structures. It mainly consisted of data collection, pre-processing, classification. Based on their respective training data they have obtained accuracy. Many researchers have proposed their framework to address such civil agitation by techniques such as semi-supervised machine learning, Neural Network, Decision tree, Naive Bayes. 1.INTRODUCTION Research in the past 10 years has exposed the increasingly important role of utilizing data from social media in different secular unrest situations. With the rapid growth in web-enabled communication technology Wikipedia mainly defines social media as an interaction among people to swap facts and proposals in virtual platforms. One approach is event detection that aims to overcome several secular turmoil or civil agitations[1]. Basically, many researchers have based their framework on the integration of supervised machine learning algorithms. They have used NLP feature extraction for detecting smaller sub events[2]. Text-based dataset Classification Method Data Pre- Text Archives Labelling processing Performance Feature Classifiers Evaluation Selection Data Gathering: This is the initial stage of the project cycle where the various kinds of reports like web-based media remarks and posts are gathered in one place. Data Pre-processing: This is the initial step of pre-processing that is utilized to present the content reports into a reasonable word design. The archives arranged for the following stage in text clearing are characterized by a good amount of features. Frequent methods are: Word-stemming: The stemming process changes various word structures into their root structure, for example, ‘association’ with ‘associate’, ‘processing’ to ‘process’. Stopwords Elimination: Stopwords, for example, "will", "to", "but", and so on are often happening, so the immaterial words should be taken out. Document Labelling: The text labelling in the documents into “positive” and “negative” labels is primarily performed by manual interference. This is a tedious job requiring utmost care and attention. This operation is often implemented by the programmer through code. Feature Selection: After pre-processing and labelling, the next significant step of text arrangement is to develop vector space, which improves the versatility, productivity, and precision of a text classifier. The principle of Feature Selection (FS) is choosing a part of feature-data from the first records. FS is performed by keeping the words with the most elevated score as per the foreordained proportion of the significance of the words. Due to text grouping, a noticeable issue is the increased dimensionality of the space of features. Many feature assessment metrics have been eminent among which are data gain (IG), Chi-square, Odds Ratio. However, FS of association word mining is more effective than IG. By considering issue of the high dimensional issue, new FS is introduced which utilizes the genetic algorithm (GA) enhancement. Classification: The programmed characterization of the reports can be performed by three different ways, Unsupervised, semi-supervised and supervised techniques. From most recent couple of years, the assignment of programmed text characterization has been widely contemplated and quick advancement appears here, including the AI approaches, for example, Bayesian classifier, Decision Tree, K – Nearest Neighbour (KNN), Support Vector Machines (SVMs), Neural Networks, etcetera. The various methods are as follows: 1.1. K-NN classifier is a case-based learning calculation that depends on a separation or closeness work for sets of observations, for example, the Euclidean separation or Cosine simplicity measures. As a result of its viability, non-parametric, and simple to usage properties, be that as it may, the arrangement time is long, and hard to locate the ideal estimation of k. For the major portion, higher estimations of k reduce the consequence of disturbance on the arrangement, however, make limits in between classes faultier. A decent k can be chosen by different heuristic methods to defeat this disadvantage alter conventional KNN with various K-values for various classes instead of fixed an incentive for all classes. Fang Lu has been attempting to improve the presentation of KNN by utilizing WKNN. 1.2. Naïve Bayes strategy is somewhat module classifier under known priori likelihood and class contingent likelihood. It is fundamental thought is to ascertain the likelihood that record D is has a place with class C. There are two occasion model are available for naive Bias as multivariate Bernoulli and multinomial model. Out of these models, the multinomial model is more reasonable when the information base is huge, yet there are recognizes two difficult issues with the multinomial model. First, it is unpleasant boundary assessed, and the issue lies in taking care of uncommon classifications that contain just hardly any preparation reports. They propose Poisson model for NB text order and furthermore give weight upgrading strategy to improve the presentation of uncommon classes. Adjusted NB proposes to improve the presentation of text arrangement, likewise gives approaches to improve credulous Bayes characterization via looking through the conditions among property. Innocent Bayes is simple for execution and calculation[4]. Thus, it is used for pre-handling for example, for vectorization. Execution of Naïve Bayes is helpless when highlights are exceptionally connected and, profoundly it is delicate to include choice so the propose two measurements for NB which are applied on a multiclass text archive. 1.3 Decision tree is utilized for text arrangement when tree interior nodes are name by term, branches leaving from them are named by test on the weight, and leaf node are speaking to relating class marks. Tree can order the report by going through the question structure from base to until it arrives at a particular leaf, which points to the aim for the grouping of the record. The vast majority of preparing information won't fit in memory choice tree development it gets wasteful due to trading of preparing tuples. To deal with this issue presents a strategy which can deal with numeric and all-out information[7]. New strategy is proposing as FDT to deal with the multi-mark report which diminishes the cost of enlistment and introduced choice tree-based emblematic guideline acceptance framework for text order which likewise improves text arrangement. The choice tree characterization strategy is differentiable from other choice help instruments with some focal points like its simplicity in perception and unraveling, regardless, for non-ace customers. Along these lines, for that, it is utilized in certain applications[8]. 1.4. The use of Support vector machine (SVM)technique to Text Classification has been proposed. SVM requires positive and negative training set which are unprecedented for various arrangement techniques. These positive and negative training set are needed for the SVM to search for the decision surface that best disengages the positive from the negative data in the n- dimensional space, provided the hyper plane[9]. SVM classifier technique is extraordinary from other with its viability to improve the execution of text order consolidating the HMM and SVM where HMMs are utilized to as a component extractor and afterward another element vector is standardized as the contribution of SVMs, so the prepared SVMs can group obscure messages effectively, likewise by brushing with Bayes use to decrease the number of highlights which as lessening number of measurements[10]. SVM is more competent to unravel the multi-label class arrangement. 1.4 A Neural Network classifier is a system of units, where the information units normally speak to terms, the yield unit(s) speaks to the classification. For characterizing a test record, its term loads are relegated
Recommended publications
  • The Textiles of the Han Dynasty & Their Relationship with Society
    The Textiles of the Han Dynasty & Their Relationship with Society Heather Langford Theses submitted for the degree of Master of Arts Faculty of Humanities and Social Sciences Centre of Asian Studies University of Adelaide May 2009 ii Dissertation submitted in partial fulfilment of the research requirements for the degree of Master of Arts Centre of Asian Studies School of Humanities and Social Sciences Adelaide University 2009 iii Table of Contents 1. Introduction.........................................................................................1 1.1. Literature Review..............................................................................13 1.2. Chapter summary ..............................................................................17 1.3. Conclusion ........................................................................................19 2. Background .......................................................................................20 2.1. Pre Han History.................................................................................20 2.2. Qin Dynasty ......................................................................................24 2.3. The Han Dynasty...............................................................................25 2.3.1. Trade with the West............................................................................. 30 2.4. Conclusion ........................................................................................32 3. Textiles and Technology....................................................................33
    [Show full text]
  • Shuk Han CHENG (Ne Shuk Han CHUNG) Education 85-90 Phd / RA
    1 page cv April 2011 Shuk Han CHENG (neé Shuk Han CHUNG) Education 85-90 PhD / RA (Department of Bacteriology, Royal Postgraduate Medical School, University of London) 80-83 BSc (Department of Zoology, University of Hong Kong) Employment 10-date Professor, Department of Biology & Chemistry, City University of Hong Kong 01-10 Associate Professor, Department of Biology & Chemistry, City University of Hong Kong 00-01 Assistant Professor, Department of Biology & Chemistry, City University of Hong Kong 97-00 Research Assistant Professor, Department of Biology & Chemistry, City University of Hong Kong 93-97 Lecturer/Scientific Officer, Depts of Paediatrics and Orthopaedics, Chinese University of Hong Kong 90-93 Postdoctoral Fellow in Tak Mak’s lab, Ontario cancer Institute, University of Toronto Research Interest: developmental and regenerative biology, nanobiological interface, nanomedicine Publications Records: 75 papers in SCI journals, 2 book chapters & 10 referred conference proceedings (full list available upon request), 1 patent awarded and 8 patents filed Five most representative publications in recent 5 years: * denotes corresponding authorship 1. Cheng J., * Cheng S.H. (2011) Poly(ethylene glycol) conjugated multi-walled carbon nanotubes as an efficient drug carrier for overcoming multi-drug resistance. Toxicology and Applied Pharmacology 250:184-93. 2. Cheng J., Chan CM, Veca LM, Poon W.L., Chan P.K., Qu L, *Sun Y.-P., *Cheng S.H. (2009). Acute and long-term effects after single loading of functionalized multi-walled carbon nanotubes into zebrafish (Danio rerio) Toxicology & Applied Pharmacology 235:216-225. 3. Gu Y.-J., Cheng J., Lin A.C.-C., Lam Y.W., *Cheng S.H., *Wong W.-T.
    [Show full text]
  • Boya Genuine] the Sweet Kitchen Mu Han(Chinese Edition
    FANLB1OIFM « Boya Genuine] the sweet kitchen Mu Han(Chinese Edition) < eBook Boya Genuine] th e sweet kitch en Mu Han(Ch inese Edition) By MU HAN ZHU To get Boya Genuine] the sweet kitchen Mu Han(Chinese Edition) eBook, remember to follow the hyperlink listed below and save the ebook or gain access to other information that are related to BOYA GENUINE] THE SWEET KITCHEN MU HAN(CHINESE EDITION) book. Our services was released using a aspire to serve as a comprehensive on the internet digital local library that oers entry to large number of PDF file document selection. You might find many dierent types of e-book as well as other literatures from the files data bank. Certain preferred subject areas that distribute on our catalog are popular books, solution key, exam test question and solution, guideline example, exercise guideline, quiz trial, user manual, consumer guide, services instruction, maintenance guide, and many others. READ ONLINE [ 1.91 MB ] Reviews This book is definitely worth buying. This really is for all who statte there had not been a worthy of studying. You will not sense monotony at at any moment of the time (that's what catalogs are for concerning should you check with me). -- Mr. Martin Baumbach Completely essential study ebook. This is for all those who statte there was not a well worth reading. I realized this book from my dad and i recommended this publication to find out. -- Jarrell Kovacek YMKF4KJGXL < Boya Genuine] the sweet kitchen Mu Han(Chinese Edition) ^ Book Oth er Books Friendfluence: The Surprising Ways Friends Make Us Who We Are [PDF] Access the link under to read "Friendfluence: The Surprising Ways Friends Make Us Who We Are" PDF document.
    [Show full text]
  • Achieving High Coverage for Floating-Point Code Via Unconstrained Programming
    Achieving High Coverage for Floating-Point Code via Unconstrained Programming Zhoulai Fu Zhendong Su University of California, Davis, USA [email protected] [email protected] Abstract have driven the research community to develop a spectrum Achieving high code coverage is essential in testing, which of automated testing techniques for achieving high code gives us confidence in code quality. Testing floating-point coverage. code usually requires painstaking efforts in handling floating- A significant challenge in coverage-based testing lies in point constraints, e.g., in symbolic execution. This paper turns the testing of numerical code, e.g., programs with floating- the challenge of testing floating-point code into the oppor- point arithmetic, non-linear variable relations, or external tunity of applying unconstrained programming — the math- function calls, such as logarithmic and trigonometric func- ematical solution for calculating function minimum points tions. Existing solutions include random testing [14, 23], over the entire search space. Our core insight is to derive a symbolic execution [17, 24], and various search-based strate- representing function from the floating-point program, any of gies [12, 25, 28, 31], which have found their way into many whose minimum points is a test input guaranteed to exercise mature implementations [16, 39]. Random testing is easy to a new branch of the tested program. This guarantee allows employ and fast, but ineffective in finding deep semantic is- us to achieve high coverage of the floating-point program by sues and handling large input spaces; symbolic execution and repeatedly minimizing the representing function. its variants can perform systematic path exploration, but suf- We have realized this approach in a tool called CoverMe fer from path explosion and are weak in dealing with complex and conducted an extensive evaluation of it on Sun’s C math program logic involving numerical constraints.
    [Show full text]
  • (And Misreading) the Draft Constitution in China, 1954
    Textual Anxiety Reading (and Misreading) the Draft Constitution in China, 1954 ✣ Neil J. Diamant and Feng Xiaocai In 1927, Mao Zedong famously wrote that a revolution is “not the same as inviting people to dinner” and is instead “an act of violence whereby one class overthrows the authority of another.” From the establishment of the People’s Republic of China (PRC) in 1949 until Mao’s death in 1976, his revolutionary vision became woven into the fabric of everyday life, but few years were as violent as the early 1950s.1 Rushing to consolidate power after finally defeating the Nationalist Party (Kuomintang, or KMT) in a decades- long power struggle, the Chinese Communist Party (CCP) threatened the lives and livelihood of millions. During the Land Reform Campaign (1948– 1953), landowners, “local tyrants,” and wealthier villagers were targeted for repression. In the Campaign to Suppress Counterrevolutionaries in 1951, the CCP attacked former KMT activists, secret society and gang members, and various “enemy agents.”2 That same year, university faculty and secondary school teachers were forced into “thought reform” meetings, and businessmen were harshly investigated during the “Five Antis” Campaign in 1952.3 1. See Mao’s “Report of an Investigation into the Peasant Movement in Hunan,” in Stuart Schram, ed., The Political Thought of Mao Tse-tung (New York: Praeger, 1969), pp. 252–253. Although the Cultural Revolution (1966–1976) was extremely violent, the death toll, estimated at roughly 1.5 million, paled in comparison to that of the early 1950s. The nearest competitor is 1958–1959, during the Great Leap Forward.
    [Show full text]
  • The Later Han Empire (25-220CE) & Its Northwestern Frontier
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2012 Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier Wai Kit Wicky Tse University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian History Commons, Asian Studies Commons, and the Military History Commons Recommended Citation Tse, Wai Kit Wicky, "Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier" (2012). Publicly Accessible Penn Dissertations. 589. https://repository.upenn.edu/edissertations/589 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/589 For more information, please contact [email protected]. Dynamics of Disintegration: The Later Han Empire (25-220CE) & Its Northwestern Frontier Abstract As a frontier region of the Qin-Han (221BCE-220CE) empire, the northwest was a new territory to the Chinese realm. Until the Later Han (25-220CE) times, some portions of the northwestern region had only been part of imperial soil for one hundred years. Its coalescence into the Chinese empire was a product of long-term expansion and conquest, which arguably defined the egionr 's military nature. Furthermore, in the harsh natural environment of the region, only tough people could survive, and unsurprisingly, the region fostered vigorous warriors. Mixed culture and multi-ethnicity featured prominently in this highly militarized frontier society, which contrasted sharply with the imperial center that promoted unified cultural values and stood in the way of a greater degree of transregional integration. As this project shows, it was the northwesterners who went through a process of political peripheralization during the Later Han times played a harbinger role of the disintegration of the empire and eventually led to the breakdown of the early imperial system in Chinese history.
    [Show full text]
  • The Ideology and Significance of the Legalists School and the School Of
    Advances in Social Science, Education and Humanities Research, volume 351 4th International Conference on Modern Management, Education Technology and Social Science (MMETSS 2019) The Ideology and Significance of the Legalists School and the School of Diplomacy in the Warring States Period Chen Xirui The Affiliated High School to Hangzhou Normal University [email protected] Keywords: Warring States Period; Legalists; Strategists; Modern Economic and Political Activities Abstract: In the Warring States Period, the legalist theory was popular, and the style of reforming the country was permeated in the land of China. The Seven Warring States known as Qin, Qi, Chu, Yan, Han, Wei and Zhao have successively changed their laws and set the foundation for the country. The national strength hovers between the valley and school’s doctrines have accelerated the historical process of the Great Unification. The legalists laid a political foundation for the big country, constructed a power framework and formulated a complete policy. On the rule of law, the strategist further opened the gap between the powers of the country. In other words, the rule of law has created conditions for the cross-border family to seek the country and the activity of the latter has intensified the pursuit of the former. This has sparked the civilization to have a depth and breadth thinking of that period, where the need of ideology and research are crucial and necessary. This article will specifically address the background of the legalists, the background of these two generations, their historical facts and major achievements as well as the research into the practical theory that was studies during that period.
    [Show full text]
  • Dynasty Report Cards
    Shang Dynasty Years: 1600-1046 BC Founder: Tang Religions/philosophies: oracle bones, ancestor worship, sacrifice Capital City: Anyang Inventions, Technology, and Achievements People of the Shang Dynasty are believed to have used calendars and developed knowledge of astronomy and math, thanks to inscriptions on tortoise shell that have been unearthed by archaeologists. The Shang calendar was at first lunar-based, but a solar-based one was developed by a man named Wan-Nien, who established a 365-day year through his observations and pinpointed the two solstices. The Shang Dynasty signified the start of the in China and was an advanced civilization for its time with sophisticated bronze works, ceramics and trinkets made from jade. Unlike their Bronze Age counterparts, Shang Dynasty artisans used piece-mold casting as opposed to the lost-wax method. This meant that they first made a model of the object they wanted to create before covering it in a clay mold. The clay mold would then be cut into sections, removed, and re-fired to create a new, unified one. By 1200 B.C., Shang armies were equipped with horse-drawn chariots. Before that, there is evidence of bronze-tipped spears, halberds (pointed axes) and bows. The language of the Shang Dynasty is an early form of modern Chinese. Chinese characters first appeared during the Shang Dynasty inscribed on cattle bone and tortoise shells. There is evidence of two numerological systems, one based on numbers from one to 10 and the other from one to 12. Other Information In the first half of Shang rule, royal burials included the burial of subordinates in the chambers alongside their ruler.
    [Show full text]
  • To Strike the Strongest Blow
    To Strike The Strongest Blow: Questions Remain Over Crackdown On 2009 Unrest In Urumchi A Report by the Uyghur Human Rights Project Washington, D.C. TABLE OF CONTENTS Introduction .......................................................................................................................3 Unclear Detention Numbers .............................................................................................4 Lack of Due Process in Detentions.................................................................................11 Misuse of Video Surveillance..........................................................................................15 Torture in Detention........................................................................................................18 Unfair Trials.....................................................................................................................19 Enforced Disappearances................................................................................................24 Letter to the Ambassador of China to the United States .............................................34 Appendix: Urumchi Evening News Article Translations ............................................36 Cover image: Montage of photos of 28 Uyghurs who have disappeared after July 5, 2009, from UighurBiz. Retrieved from: http://www.Uighurbiz.net/archives/15061 2 INTRODUCTION On July 5, 2009, in the city of Urumchi, Uyghur men, women and children peacefully assembled in People’s Square to protest government inaction
    [Show full text]
  • Three Kingdoms Unveiling the Story: List of Works
    Celebrating the 40th Anniversary of the Japan-China Cultural Exchange Agreement List of Works Organizers: Tokyo National Museum, Art Exhibitions China, NHK, NHK Promotions Inc., The Asahi Shimbun With the Support of: the Ministry of Foreign Affairs of Japan, NATIONAL CULTURAL HERITAGE ADMINISTRATION, July 9 – September 16, 2019 Embassy of the People’s Republic of China in Japan With the Sponsorship of: Heiseikan, Tokyo National Museum Dai Nippon Printing Co., Ltd., Notes Mitsui Sumitomo Insurance Co.,Ltd., MITSUI & CO., LTD. ・Exhibition numbers correspond to the catalogue entry numbers. However, the order of the artworks in the exhibition may not necessarily be the same. With the cooperation of: ・Designation is indicated by a symbol ☆ for Chinese First Grade Cultural Relic. IIDA CITY KAWAMOTO KIHACHIRO PUPPET MUSEUM, ・Works are on view throughout the exhibition period. KOEI TECMO GAMES CO., LTD., ・ Exhibition lineup may change as circumstances require. Missing numbers refer to works that have been pulled from the JAPAN AIRLINES, exhibition. HIKARI Production LTD. No. Designation Title Excavation year / Location or Artist, etc. Period and date of production Ownership Prologue: Legends of the Three Kingdoms Period 1 Guan Yu Ming dynasty, 15th–16th century Xinxiang Museum Zhuge Liang Emerges From the 2 Ming dynasty, 15th century Shanghai Museum Mountains to Serve 3 Narrative Figure Painting By Qiu Ying Ming dynasty, 16th century Shanghai Museum 4 Former Ode on the Red Cliffs By Zhang Ruitu Ming dynasty, dated 1626 Tianjin Museum Illustrated
    [Show full text]
  • CHINESE LEGAL THOUGHT in the HAN-TANG TRANSITION: Liu Song’S (D
    UCLA UCLA Pacific Basin Law Journal Title Chinese Legal Thought in the Han-Tang Transition Permalink https://escholarship.org/uc/item/73g462r0 Journal UCLA Pacific Basin Law Journal, 35(2) Author Ho, Norman P. Publication Date 2018 DOI 10.5070/P8352039070 Peer reviewed eScholarship.org Powered by the California Digital Library University of California Liu Song’s Theory of Adjudication CHINESE LEGAL THOUGHT IN THE HAN-TANG TRANSITION: Liu Song’s (d. 300) Theory of Adjudication Norman P. Ho* This article explores and analyzes the fourth century Chinese legal official and legal scholar Liu Song’s (d. 300) theory of adjudication through a full translation into English (the first translation of its kind) of his famous “Memorial on Adjudication,” which urged judicial and legal reforms during the reign of Emperor Hui (r. 290–306) of the Western Jin dynasty (265–316). This article argues that Liu believed that written law should reign supreme over other factors (e.g., societal needs, public opin- ion) in adjudicating cases. He was also one of the first major Chinese legal thinkers to explicitly set forth what we would today call the “legality prin- ciple.” But while Liu’s theory of adjudication was centered on written law, it was also motivated by a desire to control the power and discretion of judicial officials and preserve the authority of the emperor. Liu’s theory of adjudication is significant in the history of Chinese legal thought as it runs counter to the so-called “qing-li-fa” (QLF) theory of adjudication, which has strongly influenced contemporary theoretical accounts and descriptions of traditional Chinese law as a whole.
    [Show full text]
  • Chapter Three Taiyuan and the First Ancestor of Jin
    Chapter Three Taiyuan and the First Ancestor of Jin Understanding the importance of Shu Yu in the Chinese historical canon and whether his original fief of Tang, which later became Jin, was actually located near Jinyang in the Taiyuan basin is essential for determining the antiquity of his cult at the Jin Springs and rationale for establishing a hall for his worship at this location in the first place. For the elite of China, from warlords of the sixth century ce to literati of the seventeenth century, Shu Yu of Tang was the most important deity worshiped at the site of Jinci. His presence in the historical canon gave him legitimacy, and venerating the spirits of previous sovereigns might result in the granting of power over their former territory. The evidence for the cult of Shu Yu at Jinci indicates that from as early as the sixth century, he was perceived to have spiritual power over the Taiyuan basin and the regional capital of Taiyuan at Jinyang. The archaeological record suggests that the original fief of Tang was located not in the Taiyuan basin but rather much further to the south in the area of modern Quwo. Thus his cult is unlikely to date back to the Western Zhou dynasty; it must instead have been a later addition. The Shu Yu Shrine was most likely placed at the site of the Jin Springs in an effort to gain control over the strategically important Taiyuan basin through the support of local spirits. The Taiyuan basin was a border region fought over by agrarian and steppe peoples on and off until the Jin dynasty (1115–1234 ce) conquest of north China in the twelfth century ce, after which it became more centrally located within the domains of the Yuan, Ming, and Qing dynasties.
    [Show full text]