161 resultados para Resolution Trust Corporation (U.S.). Thrift Depositor Protection Oversight Board.
Resumo:
know personally. They also communicate with other members of the network who are the friends of their friends and may be friends of their friend’s network. They share their experiences and opinions within the social network about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Opinions, reputations and ecommendations will influence users' choice and usage of online resources. Recommendations may be received through a chain of friends of friends, so the problem for the user is to be able to evaluate various types of trust recommendations and reputations. This opinion or ecommendation has a great influence to choose to use or enjoy the item by the other user of the community. Users share information on the level of trust they explicitly assign to other users. This trust can be used to determine while taking decision based on any recommendation. In case of the absence of direct connection of the recommender user, propagated trust could be useful.
Resumo:
Uncooperative iris identification systems at a distance suffer from poor resolution of the captured iris images, which significantly degrades iris recognition performance. Superresolution techniques have been employed to enhance the resolution of iris images and improve the recognition performance. However, all existing super-resolution approaches proposed for the iris biometric super-resolve pixel intensity values. This paper considers transferring super-resolution of iris images from the intensity domain to the feature domain. By directly super-resolving only the features essential for recognition, and by incorporating domain specific information from iris models, improved recognition performance compared to pixel domain super-resolution can be achieved. This is the first paper to investigate the possibility of feature domain super-resolution for iris recognition, and experiments confirm the validity of the proposed approach.
Resumo:
Raman spectra of the uranyl titanate mineral euxenite were analyzed and related to the mineral structure. A comparison is made with the Raman spectra of uranyl oxyhydroxide hydrates. The obsd. bands are attributed to the Ti[n.63743]O and (UO2)2+ stretching and bending vibrations, as well as lattice vibrations of rare-earth ions. The Raman bands of euxenite are in harmony with those of the uranyl oxyhydroxides. The mineral euxenite is metamict as is evidenced by the intensity of the U[n.63743]O stretching and bending modes, which are of lower intensity than expected, and with bands that are significantly broader.
Resumo:
This paper discusses the control and protection of a microgrid that is connected to utility through back-to-back converters. The back-to-back converter connection facilitates bidirectional power flow between the utility and the microgrid. These converters can operate in two different modes–one in which a fixed amount of power is drawn from the utility and the other in which the microgrid power shortfall is supplied by the utility. In the case of a fault in the utility or microgrid side, the protection system should act not only to clear the fault but also to block the back-to-back converters such that its dc bus voltage does not fall during fault. Furthermore, a converter internal mechanism prevents it from supplying high current during a fault and this complicates the operation of a protection system. To overcome this, an admittance based relay scheme is proposed, which has an inverse time characteristic based on measured admittance of the line. The proposed protection and control schemes are able to ensure reliable operation of the microgrid.
Resumo:
A recent report delivered by the Australian Centre for Child Protection has highlighted the need for empirical evidence of effective pedagogies for supporting teaching and learning of child protection content in Australian teacher education programs (Arnold & Maio-Taddeo, 2007). This paper advances this call by presenting case study accounts of different approaches to teaching child protection content in University-based teacher education programs across three Australian States. These different cases provide a basis for understanding existing strategies as an important precursor to improving practice. Although preschool, primary and secondary schools have been involved in efforts to protect children from abuse and neglect since the 1970s, teacher education programs, including preservice and inservice programs, have been slow to align their work with child protection agendas. This paper opens a long-overdue discussion about the extent and nature of child protection content in teacher education and proposes strategies for translating research into practice.
Resumo:
Teachers have a crucial role as “sentinels” for children who have been abused or neglected. This professional development session will provide a framework for understanding the types, incidence and causes of child abuse and neglect, and teachers’ role in reporting suspected cases. The session will provide participants with knowledge and skills to enable them to identify warning signs and indicators of child abuse and neglect, know the basis of their duties to report suspected cases of abuse and neglect, and respond to the needs of abused and neglected children at school. The presentation will focus on: • the reasons why child abuse and neglect can occur; • the different types of child abuse and neglect and their effects on children; • the warning signs and indicators of physical abuse, emotional abuse, sexual abuse and neglect; • applying knowledge of indicators to make judgements about risk of harm; • responding to indications of risk of harm, including complying with legislative and policy-based duties to report suspected child abuse and neglect.
Resumo:
Section 366 of the Property Agents and Motor Dealers Act 2000 (Qld) (‘PAMDA’) mandates that all contracts for the sale of residential property in Queensland (other than contracts formed on a sale by auction) have a warning statement ‘attached’ as the first or top sheet. Alternative judicial views have emerged concerning the possibility of attaching a warning statement to a contract sent by facsimile. In recognition of the consumer protection nature of the legislation, in MP Management (Aust) Pty Ltd v Churven [2002] QSC 320 Muir J favoured a restrictive view of the word ‘attached’ requiring physical joinder of the warning statement to the relevant contract. In contrast, in MNM Developments Pty Ltd v Gerrard [2005] QDC 10 Newton DCJ opined that the requirements of the PAMDA could be met where the warning statement preceded the contract of sale in a facsimile transmission sent in one continuous stream. Newton DCJ considered that this broader approach promoted commercial convenience. In an appeal from the decision of Newton DCJ, in MNM Developments Pty Ltd v Gerrard [2005] QCA 230 a majority of the Queensland Court of Appeal has held that the restrictive view propounded by Muir J is correct. Notwithstanding possible commercial inconvenience, it is not possible for a warning statement to be attached to a contract sent by facsimile.
Resumo:
Extraterritorial processing schemes are designed to prevent and deter access to statutory and judicial safeguards in the country responsible for the interception and transfer of asylum seekers to a third country. In line with this objective, they incorporate interdiction, transfer and processing practices and standards that are deliberately isolated from the national legal and institutional protections within either the intercepting state or the third country where processing occurs. Australia's recent disbandment of its extraterritorial processing centres in third countries highlights the fact that extraterritorial processing schemes have proven unworkable as a matter of international law, as they negate the national safeguards fundamental to the satisfaction of a state's protection obligations.
Resumo:
Asylum is being gradually denuded of the national institutional mechanisms (judicial, legislative and administrative) that provide the framework for a fair and effective asylum hearing. In this sense, there is an ongoing ‘denationalization’ or ‘deformalization’ of the asylum process. This chapter critically examines one of the linchpins of this trend: the erection of pre-entry measures at ports of embarkation in order to prevent asylum seekers from physically accessing the territory of the state. Pre-entry measures comprise the core requirement that foreigners possess an entry visa granting permission to enter the state of destination. Visa requirements are increasingly implemented by immigration officials posted abroad or by officials of transit countries pursuant to bilateral agreements (so-called ‘juxtaposed’ immigration controls). Private carriers, which are subject to sanctions if they bring persons to a country who do not have permission to enter, also engage in a form of de facto immigration control on behalf of states. These measures constitute a type of ‘externalized’ or ‘exported’ border that pushes the immigration boundaries of the state as far from its physical boundaries as possible. Pre-entry measures have a crippling impact on the ability of asylum seekers to access the territory of states to claim asylum. In effect, states have ‘externalized’ asylum by replacing the legal obligation on states to protect refugees arriving at ports of entry with what are perceived to be no more than moral obligations towards asylum seekers arriving at the external border of the state.
Resumo:
Privacy has become one of the main impediments for e-health in its advancement to providing better services to its consumers. Even though many security protocols are being developed to protect information from being compromised, privacy is still a major issue in healthcare where privacy protection is very important. When consumers are confident that their sensitive information is safe from being compromised, their trust in these services will be higher and would lead to better adoption of these systems. In this paper we propose a solution to the problem of patient privacy in e-health through an information accountability framework could enhance consumer trust in e-health services and would lead to the success of e-health services.