924 resultados para Irrigation laws
Resumo:
Kohl, U. (2005). Ignorance is no Defence but is Inaccessibility? On the Accessibility of National Laws to Foreign Online Publishers. Information & Communities Technology Law, 14 (1), 25-41. RAE2008 Information & Communications Technology Law Volume 14, Issue 1, 2005 Special Issue: GATED COMMUNITIES
Resumo:
Bain, William, 'One Order, Two Laws: Recovering the 'Normative' in English School Theory', Review of International Studies, (2007) 33(4) pp.557-575 RAE2008
Resumo:
http://www.archive.org/details/constitutionlaws00ameriala
Resumo:
Recent empirical studies have shown that Internet topologies exhibit power laws of the form for the following relationships: (P1) outdegree of node (domain or router) versus rank; (P2) number of nodes versus outdegree; (P3) number of node pairs y = x^α within a neighborhood versus neighborhood size (in hops); and (P4) eigenvalues of the adjacency matrix versus rank. However, causes for the appearance of such power laws have not been convincingly given. In this paper, we examine four factors in the formation of Internet topologies. These factors are (F1) preferential connectivity of a new node to existing nodes; (F2) incremental growth of the network; (F3) distribution of nodes in space; and (F4) locality of edge connections. In synthetically generated network topologies, we study the relevance of each factor in causing the aforementioned power laws as well as other properties, namely diameter, average path length and clustering coefficient. Different kinds of network topologies are generated: (T1) topologies generated using our parametrized generator, we call BRITE; (T2) random topologies generated using the well-known Waxman model; (T3) Transit-Stub topologies generated using GT-ITM tool; and (T4) regular grid topologies. We observe that some generated topologies may not obey power laws P1 and P2. Thus, the existence of these power laws can be used to validate the accuracy of a given tool in generating representative Internet topologies. Power laws P3 and P4 were observed in nearly all considered topologies, but different topologies showed different values of the power exponent α. Thus, while the presence of power laws P3 and P4 do not give strong evidence for the representativeness of a generated topology, the value of α in P3 and P4 can be used as a litmus test for the representativeness of a generated topology. We also find that factors F1 and F2 are the key contributors in our study which provide the resemblance of our generated topologies to that of the Internet.
Resumo:
The decisions animals make about how long to wait between activities can determine the success of diverse behaviours such as foraging, group formation or risk avoidance. Remarkably, for diverse animal species, including humans, spontaneous patterns of waiting times show random ‘burstiness’ that appears scale-invariant across a broad set of scales. However, a general theory linking this phenomenon across the animal kingdom currently lacks an ecological basis. Here, we demonstrate from tracking the activities of 15 sympatric predator species (cephalopods, sharks, skates and teleosts) under natural and controlled conditions that bursty waiting times are an intrinsic spontaneous behaviour well approximated by heavy-tailed (power-law) models over data ranges up to four orders of magnitude. Scaling exponents quantifying ratios of frequent short to rare very long waits are species-specific, being determined by traits such as foraging mode (active versus ambush predation), body size and prey preference. A stochastic–deterministic decision model reproduced the empirical waiting time scaling and species-specific exponents, indicating that apparently complex scaling can emerge from simple decisions. Results indicate temporal power-law scaling is a behavioural ‘rule of thumb’ that is tuned to species’ ecological traits, implying a common pattern may have naturally evolved that optimizes move–wait decisions in less predictable natural environments.
Resumo:
This thesis consists of an analysis of electronic money (e-money), e-money’s privacy policies and relevant privacy laws. The value of information and the development of technology enhance the risk of privacy violations in the information era. Consumer privacy interests with respect to e-money are governed in part by the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and by the European Union’s Data Protection Directive. The analysis is directed at whether the privacy policies of three kinds of e-money – Octopus Card, PayPal and MasterCard – comply with the spirit and letter of these laws. In light of technology change, the laws should be interpreted to apply broadly to protect privacy interests. Enhanced privacy protection may in fact lead to greater adoption of e-money by consumers.
Resumo:
It is abound the research on the formation, rise and failure of the financial and industrial network undertaken by the Loring-Heredia-Larios triangle, bourgeois families who introduced the Industrial Revolution in the south of Andalusia. On the contrary, there are almost nonexistent studies from the perspective of the mentality that sustained their business, social and ethical model in the algid decades of their action (1850-1860). In this paper we propose some hypotheses about the ideological structures of bourgeois group and point out some keys, clues and signs for a future reconstruction of this kind, which so far has not been incardinated that early and failed malaguenan industrial revolution in streams thinking of that time.
Resumo:
We propose a physical mechanism that leads to the emergence of secondary threshold laws in processes of multiple ionization of atoms. We argue that the removal of n electrons (n>2) from a many-electron atom may proceed via intermediate resonant states of the corresponding doubly charged ion. For atoms such as rare gases, the density of such resonances in the vicinity of subsequent ionization thresholds is high. As a result, the appearance energies for multiply charged ions are close to these thresholds, while the effective power indices mu in the near-threshold energy dependence of the cross section, sigmaproportional toE(mu), are lower compared to those from the Wannier theory. This provides a possible explanation of the recent experimental results of B. Gstir [Nucl. Instrum. Methods Phys. Res. B 205, 413 (2003)].
Resumo:
The past few years have seen remarkable progress in the development of laser-based particle accelerators. The ability to produce ultrabright beams of multi-megaelectronvolt protons routinely has many potential uses from engineering to medicine, but for this potential to be realized substantial improvements in the performances of these devices must be made. Here we show that in the laser-driven accelerator that has been demonstrated experimentally to produce the highest energy protons, scaling laws derived from fluid models and supported by numerical simulations can be used to accurately describe the acceleration of proton beams for a large range of laser and target parameters. This enables us to evaluate the laser parameters needed to produce high-energy and high-quality proton beams of interest for radiography of dense objects or proton therapy of deep-seated tumours.