117 resultados para court delay


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The High Court of Australia’s ruling on the plain packaging of tobacco products is one of the great constitutional cases of our age. The ruling will resonate throughout the world - as other countries will undoubtedly seek to emulate Australia’s plain packaging regime.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tobacco, says the World Health Organization (WHO), is “the only legal consumer product that kills when used exactly as intended by the manufacturer.” With a view to discouraging smoking and giving effect to the WHO Framework Convention on Tobacco Control, the Australian Parliament passed the Tobacco Plain Packaging Act 2011 (Cth), in November of that year. The legislation was supported by all the major political parties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are currently 23,500 level crossings in Australia, broadly divided into one of two categories: active level crossings which are fully automatic and have boom barriers, alarm bells, flashing lights, and pedestrian gates; and passive level crossings, which are not automatic and aim to control road and pedestrianised walkways solely with stop and give way signs. Active level crossings are considered to be the gold standard for transport ergonomics when grade separation (i.e. constructing an over- or underpass) is not viable. In Australia, the current strategy is to annually upgrade passive level crossings with active controls but active crossings are also associated with traffic congestion, largely as a result of extended closure times. The percentage of time level crossings are closed to road vehicles during peak periods increases with the rise in the frequency of train services. The popular perception appears to be that once a level crossing is upgraded, one is free to wipe their hands and consider the job done. However, there may also be environments where active protection is not enough, but where the setting may not justify the capital costs of grade separation. Indeed, the associated congestion and traffic delay could compromise safety by contributing to the risk taking behaviour by motorists and pedestrians. In these environments it is important to understand what human factor issues are present and ask the question of whether a one size fits all solution is indeed the most ergonomically sound solution for today’s transport needs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates communication protocols for relaying sensor data from animal tracking applications back to base stations. While Delay Tolerant Networks (DTNs) are well suited to such challenging environments, most existing protocols do not consider the available energy that is particularly important when tracking devices can harvest energy. This limits both the network lifetime and delivery probability in energy-constrained applications to the point when routing performance becomes worse than using no routing at all. Our work shows that substantial improvement in data yields can be achieved through simple yet efficient energy-aware strategies. Conceptually, there is need for balancing the energy spent on sensing, data mulling, and delivery of direct packets to destination. We use empirical traces collected in a flying fox (fruit bat) tracking project and show that simple threshold-based energy-aware strategies yield up to 20% higher delivery rates. Furthermore, these results generalize well for a wide range of operating conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Article 38(1) of the Statute of International Court of Justice (hereinafter ICJ) is today generally seen as a direction to the significant sources of international law, which the world court must consider in resolving disputes; however, the list is not exhaustive nor encompasses all the formal and material sources of the international legal system. Article 38 of the Statute of ICJ was written ninety years ago in a different world, a question is under debate in many states, whether or not sources mentioned in Article 38 of the statute are compatible with needs of 21st century ? In recent decade, many new actors come on the stage which have transformed international law and now it is not only governs relations among states but also covers many International Organizations. Article 38(2) does refer to the other possible sources but does not define them. Moreover, law is a set of rules that citizens must follow to regulate peace and order in society. These laws are binding on both the individual and the state on a domestic and international level. Do states regard this particular rule as a rule of international law? The modern legal system of states is in the form of a specified and well organized set of rules, regulating affairs of different organs of a state. States also need a body of rules for their intercourse with each other. These sets of rules among states are called “International Law.” This article examines international law, its foundation and sources. It considers whether international conventions and treaties can be the only way states can considerably create international law, or there is a need for clarity about the sources of international law. Article is divided into two parts, the first one deals with sources of international law discussed in Article 38 of the statute of International Court of Justice whereas the second one discusses the material and formal sources of law, which still need reorganization as sources of law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The South Australian Supreme Court this week found that Google is legally responsible when its search results link to defamatory content on the web. In this long-running case, Dr Janice Duffy has been trying for more than six years to clear her name and remove links to defamatory material when people search for her using Google. The main culprit is the US based website Ripoff Reports, where people have posted negative reviews of Dr Duffy. Under United States law, defamation is very hard to prove, and US websites are not liable for comments made by their users. Since it was not possible to get harmful or abusive comments removed from the source, Dr Duffy instead asked Google to remove the links from its search results. Google removed some of these links, but only from its Australian domain (google.com.au), and it left many of them active. This latest court decision is a big win for Dr Duffy. The court found that once Google was alerted to the defamatory material, it was then under an obligation to act to censor its search results and prevent further harm to Dr Duffy’s reputation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Sutton v Tang [2015] QDC 191 Reid DCJ considered the circumstances that may be relevant to the exercise of the discretion to order a transfer of a proceeding to the Queensland Civil and Administrative Tribunal (the tribunal) under s53 of the Queensland Civil and Administrative Tribunal Act 2009 (Qld) (the Act).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Hewitt v Bayntum & Allianz Australia Insurance Ltd [2015] QSC 250 the court was asked to sanction a compromise of a proceeding by a plaintiff who, though a recovering drug addict, was able to give instructions and understand the proposed compromise.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Bolitho v Banksia Securities Limited (No 4) [2014] VSC 582 the Supreme Court of Victoria concluded that the proper administration of justice, including the appearance of justice, required that the lawyers representing the plaintiff in the group proceeding should be restrained from continuing to act for the plaintiff. This Victorian case illustrates how courts are likely to respond when lawyers attempt to circumvent the prohibition on contingency fees through litigation funding in which they have a financial interest.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research addresses efficient use of the available energy in resource constrained mobile sensor nodes to prevent early depletion of the battery and maximize the packet delivery rate. This research contributes two energy-aware enhancement strategies to improve the network lifetime and delivery probability for energy constrained applications in the delay-tolerant networking environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public key authentication is the verification of the identity-public key binding, and is foundational to the security of any network. The contribution of this thesis has been to provide public key authentication for a decentralised and resource challenged network such as an autonomous Delay Tolerant Network (DTN). It has resulted in the development and evaluation of a combined co-localisation trust system and key distribution scheme evaluated on a realistic large geographic scale mobility model. The thesis also addresses the problem of unplanned key revocation and replacement without any central authority.