We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Edited by
James Ip, Great Ormond Street Hospital for Children, London,Grant Stuart, Great Ormond Street Hospital for Children, London,Isabeau Walker, Great Ormond Street Hospital for Children, London,Ian James, Great Ormond Street Hospital for Children, London
Cleft lip and palate is a relatively common congenital condition presenting for surgical correction. Anaesthetic management has some specific considerations involving airway surgery in infants and young children who may have other associated anomalies. Surgical care pathway and approaches are discussed as relevant to anaesthesiologists. Perioperative management, including preassessment of the child, optimisation prior to surgery, intraoperative and postoperative care, is presented. The importance of a multidisciplinary approach, good communication, shared airway management and adequate multimodal analgesia with the avoidance of respiratory depression are highlighted. Anaesthesia for secondary speech surgery is also presented.
This chapter focuses on the governance practices of the Comando Vermelho gang that has controlled Complexo da Maré’s most populous favela, Parque União, for more than three decades. Like their CVNH allies, CVPU has been part of the CV faction for this entire period. And yet, their governance styles have diverged considerably. CVPU evinces a less chaotic evolution as they have remained, aside from several years at the turn of the millennium, a social bandit regime. Overall, the absence of an active rival threat has produced a gang that employs far lower levels of coercion than their counterparts while active enforcement has incentivized CVPU to provide significant benefits to residents. This chapter traces the evolution of these dynamics through a combination of oral histories with residents and gang members, analysis of newspaper archives and anonymous denunciations, as well as participant observation during the author’s time living in Maré.
This chapter examines the role of national and regional institutions in promoting integrated regulation and administration of biodiversity and forest management in the Middle East and North African (MENA) region. Drawing lessons from Morocco, it evaluates current legal and institutional challenges in the integrated management of forest and biodiversity. This chapter examines four fundamental themes raised by the legal and judicial protection of the forests. First, it examines the need for integrated regulation of biodiversity and forest management, given the interconnectedness of these two elements. Second, it evaluates integration gaps and challenges in laws relating to forest management and biodiversity in Morocco. Third, it evaluates institutional arrangements in forest management in Morocco, especially the role of the Water and Forestry Agency in activating integrated management of forest and biodiversity in Morocco. Fourth, it offers recommendations on how to advance integrated management of forest and biodiversity in Morocco and across the Maghreb region.
Perhaps paradoxically, it is vital for any newly founded company or established business not to focus exclusively on technology development, technology maturation, and product design. Of course, having a product that performs according to specification is critical, but if the market is not well understood, you have a flawed business model, or your manufacturing costs far exceed what customers are willing to pay for your product, then even if the technology is excellent the business might fail. This chapter is devoted to basic business concepts and fundamental principles in cost accounting, analysis, and market research. Topics include an introduction to value chains, calculating capital costs of building new plants or acquiring new units for production (CapEx), operational expenditures (OpEx), learning curve analysis, and assessment of profitability. The chapter will also introduce basic tools and methods for market research, which will provide the necessary insights to position your technology in a constantly evolving market.
In Germany, the utility model is a type of intellectual property right that provides protection for novel and useful inventions. It is governed by the German Utility Model Act (“Gebrauchsmustergesetz” – GebrMG) which was enacted in 1891, making it the oldest still-existing utility model system in the world. Utility models grant the right holder exclusive control over the use and commercialisation of an invention for a period of ten years from the date of filing, subject to the payment of annual renewal fees. In a way, the utility model is the “little sister” of a full-fledged patent (also called a “petty patent”), protecting the same type of subject matter (technical inventions) with a more limited scope.
This chapter begins by motivating the puzzles the book seeks to answer. Why do Rio de Janeiro’s drug-trafficking gangs govern neighborhoods? Why do some of these gangs rely on violence and coercion while others resolve disputes, offer welfare, and organize cultural activities for residents? This book argues that gangs govern in these ways because they need the obedience and support of local residents to survive amid shifting relations with rival gangs and the police. This chapter outlines a theory of criminalized governance which revolves around the relations that emerge between gang members and residents within distinct security environments. This theoretical framework builds on three traditions that view criminalized governance akin to processes of state formation, rebel governance, or state perversion. Finally, this chapter outlines its mixed method approach, and describes the methodological and ethical considerations involved in eighteen months of participant observation in three rival gang territories, 206 semi-structured interviews with residents and gang members, and the collection of more than 400 archival documents and a dataset of more than 20,000 anonymous denunciations.
The chapter addresses attentional distribution in conceptualisations of events. It argues that language directs attention over particular portions of an event-structure selecting certain elements for focal attention while conceptually backgrounding other elements. The ideological implications of attentional distribution are discussed with reference to mystification whereby either human agency in or the human impact of harmful social actions is obscured. Two case studies are presented. The first considers action-chain profiling in media coverage of fatalities on the Gaza border. It shows how attentional distributions evoked by intransitive, passive and agentless passive constructions as well as nominalisations conceptually background those responsible for the fatalities. It further shows the conceptual means by which the impact of violent actions may be mitigated. The second considers path-profiling in immigration discourse. It shows how different verb choices serve to highlight humanitarian motivations for migration versus the impact of migration on host countries and considers the role of metonymy in legitimating hostile immigration policies.
Nonequilibrium transport equations are derived for two types of diffusive systems: (1) viscous fluids made of a single molecular species that support thermal flux and (2) two-component (solute and solvent) miscible fluids that support solute flux and thermal flux. The general statement of energy conservation for any viscous fluid is derived and used to obtain the statement of entropy conservation for each system type. This identifies the irreversible entropy production of each system, which in turn produces linear transport laws relating the nonequilibrium diffusive flux to the gradients in the intensive parameters. The matrix of transport coefficients in the transport laws is proven to be symmetric (Onsager symmetry) using the continuum governing equations and requires the direction of flow to be reversed to obtain symmetry. Capillary physics is treated using Cahn–Hilliard theory that resolves the gradients in concentration across transition layers separating two immiscible, or partially miscible, fluid. The rules of contact-line movement (imbibition and drainage) in conduits are derived from a more macroscopic perspective where the transition layers are modeled as sharp interfaces.
Living in coastal Bangladesh is a good working definition of being water insecure. Cyclones and storm surges overwhelm the deltaic floodplains with high salinity in groundwater limiting safe drinking water. Decades of government, donor and household investments have created a portfolio of drinking water technologies – tube wells, pond sand filters, piped schemes, and rainwater harvesting – with varied water quality, costs and maintenance needs. Differences in local hydrogeology, infrastructure gaps, and seasonal variability create inequalities in water availability and cost burdens. Informal vendors source water from distant tube wells and reverse osmosis plants, selling it to places with no other alternatives. The Water Diaries chart households’ daily water source choices, facing uncertain health risks and high-cost burdens. Drawing on this research evidence, a new model for professional service delivery has been piloted in schools and healthcare facilities. Pilot results showed that the SafePani model can achieve water safety and reliability at less than USD 1 per person per year. The government has invested in scaling up the SafePani model through results-based funding, in recognition of the need for institutional and financial reforms for sustainable andsafe rural drinking water services.
While national rules regarding the scope, availability and issuance of utility models vary from country to country, most utility model regimes offer protection for tangible products, with many, but not all, jurisdictions excluding processes, biological materials and computer software from the scope of protection. The duration of utility model protection ranges from five to fifteen years, with most countries offering ten years of protection. In most countries, utility model applications are not formally examined and must simply disclose the product in question. Given the lack of examination, obtaining utility models is generally viewed as faster and cheaper than obtaining patents. This combination of speed and cost, in theory, makes utility models potentially attractive to small and medium enterprises (SMEs) that cannot afford to obtain full patent protection. Similar considerations have also been raised as advantageous to innovators in low-income countries.