6 resultados para International Sunday school lessons.

em Cochin University of Science


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study is an attempt to look at the impact of international norms on the criminal justice administration in India. It has been confined to the criminal justice administration since it is here that the concept of sovereignty is affected the most. The study is intended to give a fair idea as to the position India holds in the matter of implementation of international norms in the area of criminal justice administration and the areas that require urgent attention. The study suggests that the country’s system is on the right track towards the implementation of the international norms. The position of law in India and the requirements under international norms with respect to criminal justice administration have been studied by considering the same at three stages – pre trial, trial and post trial stages. The question as to whether they comply with the international standards and the approaches of the court has been inquired into this study

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis is an attempt to explore the problems faced by Indian Women and to examine the ways in which the human rights of women could be better protected in the light of international movements with special reference to national legislation and judicial decisions.The evolution of human rights from early period to Universal Declaration of Human Rights, 1948 is traced in the first chapter. The second chapter deals with the evolution of human rights in India. The evolution of fundamental rights and directive principles and the role played by the Indian Judiciary in enforcing the human rights enumerated in various international instruments dealing with human rights are also dealt with in this chapter. The rights guaranteed to women under the various international documents have been dealt with in the third chapter.It is noticed that the international documents have had their impact in India leading to creation of machinery for protection of human rights. Organised violations of women's rights such as prostitution, devadasi system, domestic violence, sexual harassment at workplaces, the evil of dowry, female infanticide etc. have been analysed in the light of existing laws and decisional jurisprudence in the fourth chapter. The fifth chapter analyses the decisions and consensus that emerged from the world conferences on women and their impact on the Indian Society and Judiciary. The constitutional provisions and legislative provisions protecting the rights of women have been critically examined in the sixth chapter. Chapter seven deals with various mechanisms evolved to protect the human rights of women. The eighth chapter contains conclusions and suggestions.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In light of the various international instruments and international agencies that are actively engaged in resolving the issue of ABS, the present work tries to find an answer to the larger question how far the above agencies have succeeded in regulating access and make sure of benefit sharing. In this process, the work comprehensively analyses the work of different agencies involved in the process. It tries to find out the major obstacles that stand in the way of fulfilment of the benefit sharing objective and proposes the ways and means to tackle them. The study first traces the legal foundations of the concept of property in GRs and associated TK.For this, it starts with analysis of the nature of property and the questions related to ownership in GRs as contained in the CBD as well as in various State legislations. It further examines the notion of property before and after the enactment of the CBD and establishes that the CBD contains strong private property jurisprudence.Based on the theoretical foundation of private property right,Chapter 3 analyses the benefit sharing mechanism of the CBD, i.e. the Nagoya Protocol. It searches for a theoretical convergence of the notion of property as reflected in the two instruments and successfully establishes the same. It makes an appraisal of the Nagoya regime to find out how far it has gone beyond the CBD in ensuring the task of benefit sharing and the impediments in its way.Realizing that the ITPGRFA forms part of the CBD system, Chapter 4 analyses the benefit sharing structure of ITPGRFA as revealed through its multilateral system. This gives the work the benefit of comparing two different benefit sharing models operating on the same philosophy of property. This chapter tries to find out whether there is conceptual coherence in the notion of property when the benefit sharing model changes. It alsocompares the merits and demerits of both the systems and tries to locate the hurdles in achieving benefit sharing. Aware of the legal impediments caused by IPRs in the process of ABS, Chapter 5 tries to explore the linkages between IPRs and GRs and associated TK and assesses why contract-based CBD system fails before the monopoly rights under TRIPS. Chapter 6 analyses the different solutions suggested by the international community at the TRIPS Council as well as the WIPO (World Intellectual property Organisation) and examines their effectiveness. Chapter 7 concludes that considering the inability of the present IP system to understand the grass root realities of the indigenous communities as well as the varying situations of the country of origin, the best possible way to recognise the CBD goals in the TRIPS could be better achieved through linking the two instruments by means of the triple disclosure requirement in Article 29 as suggested by the Disclosure Group during the TRIPS Council deliberations. It also recommends that considering the nature of property in GR, a new section/chapter in the TRIPS dealing with GRs would be another workable solution.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper highlights the prediction of learning disabilities (LD) in school-age children using rough set theory (RST) with an emphasis on application of data mining. In rough sets, data analysis start from a data table called an information system, which contains data about objects of interest, characterized in terms of attributes. These attributes consist of the properties of learning disabilities. By finding the relationship between these attributes, the redundant attributes can be eliminated and core attributes determined. Also, rule mining is performed in rough sets using the algorithm LEM1. The prediction of LD is accurately done by using Rosetta, the rough set tool kit for analysis of data. The result obtained from this study is compared with the output of a similar study conducted by us using Support Vector Machine (SVM) with Sequential Minimal Optimisation (SMO) algorithm. It is found that, using the concepts of reduct and global covering, we can easily predict the learning disabilities in children

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper highlights the prediction of Learning Disabilities (LD) in school-age children using two classification methods, Support Vector Machine (SVM) and Decision Tree (DT), with an emphasis on applications of data mining. About 10% of children enrolled in school have a learning disability. Learning disability prediction in school age children is a very complicated task because it tends to be identified in elementary school where there is no one sign to be identified. By using any of the two classification methods, SVM and DT, we can easily and accurately predict LD in any child. Also, we can determine the merits and demerits of these two classifiers and the best one can be selected for the use in the relevant field. In this study, Sequential Minimal Optimization (SMO) algorithm is used in performing SVM and J48 algorithm is used in constructing decision trees.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.