939 resultados para Acts of personnel
Resumo:
The availability of a network strongly depends on the frequency of service outages and the recovery time for each outage. The loss of network resources includes complete or partial failure of hardware and software components, power outages, scheduled maintenance such as software and hardware, operational errors such as configuration errors and acts of nature such as floods, tornadoes and earthquakes. This paper proposes a practical approach to the enhancement of QoS routing by means of providing alternative or repair paths in the event of a breakage of a working path. The proposed scheme guarantees that every Protected Node (PN) is connected to a multi-repair path such that no further failure or breakage of single or double repair paths can cause any simultaneous loss of connectivity between an ingress node and an egress node. Links to be protected in an MPLS network are predefined and an LSP request involves the establishment of a working path. The use of multi-protection paths permits the formation of numerous protection paths allowing greater flexibility. Our analysis will examine several methods including single, double and multi-repair routes and the prioritization of signals along the protected paths to improve the Quality of Service (QoS), throughput, reduce the cost of the protection path placement, delay, congestion and collision.
Resumo:
The impending decline of the tenanted sector in British agriculture has been forecast for many years. Much debate has surrounded the issues and ensuing legislation has repeatedly attempted to stave-off what some view as the inevitable demise of tenant farmers. Following a flurry of activity after the Northfield Report of 1979 and culminating in the Agricultural Holdings Acts of 1984 and 1986, the debate has recently been fuelled by a strongly pro-market lobby. With the public support of successive Ministers of Agriculture, this lobby has advocated a rejection of the former state intervention in the landlord/tenant relationship in favour of freedom of contract, an option that now appears increasingly likely to reach the statute books. This paper reviews the significant elements of the debate, attempting to explain the principal reasons for the failure of earlier legislation and the primary shortcomings of the current emphasis of consultation. The paper concludes that while there are some significant legislative disincentives to letting land, the freeing-up of contracts in isolation from other, non-contractual issues, will not result in the increase in lettings purportedly desired by the Ministers and their acolytes.
Resumo:
This piece is a contribution to the exhibition catalogue of Barbadian / Canadian artist Joscelyn Gardner's exhibition, 'Bleeding & Breeding' curated by Olexander Wlasenko, January 14-February 12, 2012 in the Station Gallery, Whitby, Ontario, Canada. The piece examines the ways in which Gardner's Creole Portraits II (2007) and Creole Portraits III (2009) issue a provocative and carefully crafted contestation to the journals of the slave-owner and amateur botanist Thomas Thistlewood. It argues that while Thistlewood’s journals make raced and gendered bodies seemingly available to knowledge, incorporating them within the colonial archive as signs of subjection, Gardener’s portraits disrupt these acts of history and knowledge. Her artistic response marks a radical departure from the significant body of scholarship that has drawn on the Thistlewood journals to date. Creatively contesting his narratives’ dispossession of Creole female subjects and yet aware of the problems of innocent recovery, her works style representations that retain the consciousness and effect of historical erasure. Through an oxymoronic aesthetic that assembles a highly crafted verisimilitude alongside the condition of invisibility and brings atrocity into the orbit of the aesthetic, these portraits force us to question what stakes are involved in bringing the lives of the enslaved and violated back into regimes of representation.
Resumo:
Squirmish at the Oasis takes its name from Luigi Russolo's fourth noise network 'Skirmish at the Oasis' performed in Milan in 1913. 100 years on the Agency of Noise contemplate changes in technology and the culture industry that provoke new questions around the deliberate use of noise within music and art. Through live acts of enquiry and experimentation five artists unravel paradoxes associated with the use of noise in art, music and the gallery space. The works challenge tensions, contradictions and possible oxymorons that emerge through the use and acceptance of noise within an artistic framework. Featuring: DAISY DIXON / GRAHAM DUNNING / POLLYFIBRE / DANE SUTHERLAND / MARNIE WATTS
Resumo:
Briefing phase interactions between clients and designers are recognized as social engagements, characterized by communicative sign use, where conceptual ideas are gradually transformed into potential design solutions. A semiotic analysis of briefing communications between client stakeholders and designers provides evidence of the significance and importance of stakeholder interpretation and understanding of design, empirical data being drawn from a qualitative study of NHS hospital construction projects in the UK. It is contended that stakeholders engage with a project through communicative signs and artefacts of design, referencing personal cognitive knowledge in acts of interpretation that may be different from those of designers and externally appointed client advisers. Such interpretations occur in addition to NHS client and design team efforts to ‘engage’ with and ‘understand’ stakeholders using a variety of methods. Social semiotic theorizations indicate how narrative strategies motivate the formulation of signs and artefacts in briefing work, the role of sign authors and sign readers being elucidated as a result. Findings are contextualized against current understandings of briefing communications and stakeholder management practices, a more socially attuned understanding of briefing countering some of the process-led improvement models that have characterized much of the post-Egan report literature. A stakeholder interpretation model is presented as one potential method to safeguard against unforeseen interpretations occurring, the model aligning with the proposal for a more measured recognition of how designs can trigger interpretations among client stakeholders.
Resumo:
The narrative of the United States is of a "nation of immigrants" in which the language shift patterns of earlier ethnolinguistic groups have tended towards linguistic assimilation through English. In recent years, however, changes in the demographic landscape and language maintenance by non-English speaking immigrants, particularly Hispanics, have been perceived as threats and have led to calls for an official English language policy.This thesis aims to contribute to the study of language policy making from a societal security perspective as expressed in attitudes regarding language and identity originating in the daily interaction between language groups. The focus is on the role of language and American identity in relation to immigration. The study takes an interdisciplinary approach combining language policy studies, security theory, and critical discourse analysis. The material consists of articles collected from four newspapers, namely USA Today, The New York Times, Los Angeles Times, and San Francisco Chronicle between April 2006 and December 2007.Two discourse types are evident from the analysis namely Loyalty and Efficiency. The former is mainly marked by concerns of national identity and contains speech acts of security related to language shift, choice and English for unity. Immigrants are represented as dehumanised, and harmful. Immigration is given as sovereignty-related, racial, and as war. The discourse type of Efficiency is mainly instrumental and contains speech acts of security related to cost, provision of services, health and safety, and social mobility. Immigrants are further represented as a labour resource. These discourse types reflect how the construction of the linguistic 'we' is expected to be maintained. Loyalty is triggered by arguments that the collective identity is threatened and is itself used in reproducing the collective 'we' through hegemonic expressions of monolingualism in the public space and semi-public space. The denigration of immigrants is used as a tool for enhancing societal security through solidarity and as a possible justification for the denial of minority rights. Also, although language acquisition patterns still follow the historical trend of language shift, factors indicating cultural separateness such as the appearance of speech communities or the use of minority languages in the public space and semi-public space have led to manifestations of intolerance. Examples of discrimination and prejudice towards minority groups indicate that the perception of worth of a shared language differs from the actual worth of dominant language acquisition for integration purposes. The study further indicates that the efficient working of the free market by using minority languages to sell services or buy labour is perceived as conflicting with nation-building notions since it may create separately functioning sub-communities with a new cultural capital recognised as legitimate competence. The discourse types mainly represent securitising moves constructing existential threats. The perception of threat and ideas of national belonging are primarily based on a zero-sum notion favouring monolingualism. Further, the identity of the immigrant individual is seen as dynamic and adaptable to assimilationist measures whereas the identity of the state and its members are perceived as static. Also, the study shows that debates concerning language status are linked to extra-linguistic matters. To conclude, policy makers in the US need to consider the relationship between four factors, namely societal security based on collective identity, individual/human security, human rights, and a changing linguistic demography, for proposed language intervention measures to be successful.
Resumo:
Vegetation growing on railway trackbeds and embankments present potential problems. The presence of vegetation threatens the safety of personnel inspecting the railway infrastructure. In addition vegetation growth clogs the ballast and results in inadequate track drainage which in turn could lead to the collapse of the railway embankment. Assessing vegetation within the realm of railway maintenance is mainly carried out manually by making visual inspections along the track. This is done either on-site or by watching videos recorded by maintenance vehicles mainly operated by the national railway administrative body. A need for the automated detection and characterisation of vegetation on railways (a subset of vegetation control/management) has been identified in collaboration with local railway maintenance subcontractors and Trafikverket, the Swedish Transport Administration (STA). The latter is responsible for long-term planning of the transport system for all types of traffic, as well as for the building, operation and maintenance of public roads and railways. The purpose of this research project was to investigate how vegetation can be measured and quantified by human raters and how machine vision can automate the same process. Data were acquired at railway trackbeds and embankments during field measurement experiments. All field data (such as images) in this thesis work was acquired on operational, lightly trafficked railway tracks, mostly trafficked by goods trains. Data were also generated by letting (human) raters conduct visual estimates of plant cover and/or count the number of plants, either on-site or in-house by making visual estimates of the images acquired from the field experiments. Later, the degree of reliability of(human) raters’ visual estimates were investigated and compared against machine vision algorithms. The overall results of the investigations involving human raters showed inconsistency in their estimates, and are therefore unreliable. As a result of the exploration of machine vision, computational methods and algorithms enabling automatic detection and characterisation of vegetation along railways were developed. The results achieved in the current work have shown that the use of image data for detecting vegetation is indeed possible and that such results could form the base for decisions regarding vegetation control. The performance of the machine vision algorithm which quantifies the vegetation cover was able to process 98% of the im-age data. Investigations of classifying plants from images were conducted in in order to recognise the specie. The classification rate accuracy was 95%.Objective measurements such as the ones proposed in thesis offers easy access to the measurements to all the involved parties and makes the subcontracting process easier i.e., both the subcontractors and the national railway administration are given the same reference framework concerning vegetation before signing a contract, which can then be crosschecked post maintenance.A very important issue which comes with an increasing ability to recognise species is the maintenance of biological diversity. Biological diversity along the trackbeds and embankments can be mapped, and maintained, through better and robust monitoring procedures. Continuously monitoring the state of vegetation along railways is highly recommended in order to identify a need for maintenance actions, and in addition to keep track of biodiversity. The computational methods or algorithms developed form the foundation of an automatic inspection system capable of objectively supporting manual inspections, or replacing manual inspections.
Resumo:
The acts of public administration personnel are of great importance and various laws have been passed in attempt to limit the related expenses. The management of Public administration personnel is based on the principle of efficiency. The TCE/RJ (State of Rio de Janeiro/Audit Court) digital communication system is expected through telework to facilitate its auditing duties in compliance with the terms of the Federal and State constitutions. The TCE/RJ, the superior judicial body of auditing, has done more than just reduce costs and use flextime; it applies telework as an instrument to optimize public service through SICODI digital certification to maximize the resources applied to this constitutional act with greater efficiency for effective auditing. The focus of the first part of this study is to evaluate the tasks of positions that forward the TCE/RJ objectives and the profile characteristics of employees of the inspection area on personnel performance beginning with defined concepts and purposes. Questionnaires for auditors and technicians of the area were approved for this specific purpose to analyze the duties of positions and employee profiles. The second part of this study evaluates the TCE/RJ digital communication system according to theoretical reference and ISO/IEC Standard No. 9126-1, observing three dimensions: the content, usability and functionality. The results obtained, with the use of qualitative methods complemented by quantitative analysis, were positive for the implementation of telework in the inspection of personnel performance in relation to the analysts and technicians involved in this type of auditing as well as in relation to the TCE/RJ digital communication system.
Resumo:
The relationship between Islamic Law and other legal systems (basically western type domestic legal orders and international law) is often thought of in terms of compatibility or incompatibility. Concerning certain subject matters of choice, the compatibility of Islamic (legal) principles with the values embedded in legal systems that are regarded as characteristic of the Modern Age is tested by sets of questions: is democracy possible in Islam? Does Islam recognize human rights and are those rights equivalent to a more universal conception? Does Islam recognize or condone more extreme acts of violence and does it justify violence differently? Etc. Such questions and many more presuppose the existence of an ensemble of rules or principles which, as any other set of rules and principles, purport to regulate social behavior. This ensemble is generically referred to as Islamic Law. However, one set of questions is usually left unanswered: is Islamic Law a legal system? If it is a legal system, what are its specific characteristics? How does it work? Where does it apply? It is this paper`s argument that the relationship between Islamic Law and domestic and international law can only be understood if looked upon as a relationship between distinct legal systems or legal orders.
Resumo:
We present a detailed description of the predatory behavior of the beetle Canthon virens Mannerheim, 1829, on the leafcutter ant Atta sp. We observed 51 acts of predation, which were also recorded on film and subjected to behavioral analysis. Canthon virens exhibited 28 behaviors while predating upon Atta sp. queens. Adult beetles search for queens while flying in a zigzag pattern, 15 to 20cm above the ground. After catching a queen, the predator stands on its back and starts cutting the queen cervix. Once the prey is decapitated, the predator rolls it until an insurmountable obstacle is reached. The distance from the site of predation to the obstacle can vary widely and is unpredictable. The beetle rolling the queen also buries it in a very peculiar way: first, it digs a small hole and pulls the queen inside, while another beetle is attached to the prey. The burial process takes many hours (up to 12) and may depend on the hardness of the soil and the presence of obstacles. In general, one or two beetles are found in a chamber with the queen after it is buried. They make the brood balls, which serve as food for the offspring. This study contributes to the knowledge of the predatory behavior of Canthon virens, a predator poorly studied in Brazil and widespread in the country. Copyright © 2012 Luiz Carlos Forti et al.
Resumo:
The potential merits of Carver and Scheier's (1981) control theory in the prediction of targeted violence are reviewed and several novel indicators of risk that are consistent with this theory are suggested for study. It was hypothesized that: (a) similarity between inappropriate contact with politicians and extremist group literature and writings; (b) the temporal proximity to violent or otherwise criminal actions and notable anniversaries of such groups; (c) detailed specification of a plan to engage in problematic approach behavior, and; (d) self-focus, will be significant predictors of problematic approach behavior. A sample of 506 individuals who engaged in threatening or otherwise inappropriate contact toward members of the United States Congress was drawn from the case files of the United States Capitol Police. Results of the present research indicated that detailed specification of a plan to engage in problematic approach behavior was strongly predictive of actually engaging in problematic approach. Furthermore, high self-focus was significantly related to problematic approach between-persons, although within-person, higher-than-average self-focus showed no such relation. Neither temporal proximity to notable acts of extremist violence nor similarity to known extremist group writings was found to be associated with problematic approach in this sample.
Resumo:
This inquiry reveals the crucial guidance of teachers toward surveying the capacity and needs of students, the formation of ideas, acting upon ideas, fostering connections, seeing potential, making judgments, and arranging conditions. Each aesthetic trace causes me to wonder how teachers learn to create experiences that foster student participation in the world aesthetically. The following considerations surface: • Given the emphasis in schools on outcomes and results, how do we encourage teachers to focus on acts of mind instead of end products in their work with students? • Given the orientations toward technical rationality, to fixed sequence, how do we help teachers experience fluid, purposeful learning adventures with students in which the imagi¬nation is given room to play? • Given the tendency to conceive of planning in teaching as the deciding of everything in advance, how do we help teachers and students become attuned to making good judgments derived from within learning experiences? • How do we help teachers build dialogical multivoiced conversations instead of monolithic curriculum? • What do we do to recover the pleasure dwelling in subject matter? How do we get teachers and students to engage thoughtfully in meaningful learning as opposed to covering curriculum7 • A capacity to attend sensitively, to perceive the complexity of relationships coming together in any teaching/learning experience seems critical. How do we help teachers and students attend to the unity of a learning experience and the play of meanings that arises from such undergoing and doing? The traces, patterns, and texture evidenced locate tremendous hope and wondrous possibilities alive within aesthetic teaching/learning encounters. It is such aliveness I encountered in the grade 4 art classroom that opened this account and continues to compel my attention. Possibilities for teaching, learning, and teacher education emerge. I am convinced they are most worthy of continued pursuit.
Resumo:
The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. Copyright © 2011 John Wiley & Sons, Ltd.
Resumo:
This project attempts to contribute to the various discourses within the black womanist tradition. In 1983, Alice Walker published her landmark collection of essays entitled In Search of Our Mother Gardens: Womanist Prose. At the outset of the volume, Walker defines the core concept of womanism. After a poetic four-part definition of the term womanist, Walker concludes by stating, 'womanist is to feminist as purple to lavender' (Phillips 19). Although this analogy is critically engaged, the scholarly discourse that emerged in response to Walker's proposition shapes the intellectual inner workings of this project. Certain established concepts (such as ancestral mediation or the laying on of hands) work in conjunction with my own concepts of 'wom(b)anism' and 'the communal womb' to frame the interpretive discussions throughout these pages. Wom(b)anism and the communal womb both emerge from the black feminist and womanist traditions, especially via the role of ancestral mediation but also within the contested discourses on womanism itself. I apply the two concepts (wom(b)anism and the communal womb) to my readings of Haile Gerima's Sankofa, Gloria Naylor's The Women of Brewster Place, and Gayl Jones' Corregidora. The relationship between the community and women's wombs across each of these texts construct a narrative that features ancestral mediation (or intervention), various acts of violence committed against women's bodies, and the complicated circumstances through which women heal themselves andtheir communities.
Resumo:
This project looked at the nature, contents, methods, means and legal and political effects of the influence that constitutional courts exercise upon the legislative and executive powers in the newly established democracies of Central and Eastern Europe. The basic hypothesis was that these courts work to provide a limitation of political power within the framework of the principal constitutional values and that they force the legislature and executive to exercise their powers and duties in strict accordance with the constitution. Following a study of the documentary sources, including primarily the relevant constitutional and statutory provisions and decisions of constitutional courts, Mr. Cvetkovski prepared a questionnaire on various aspects of the topics researched and sent it to the respective constitutional courts. A series of direct interviews with court officials in six of the ten countries then served to clarify a large number of questions relating to differences in procedures etc. that arose from the questionnaires. As a final stage, the findings were compared with those described in recent publications on constitutional control in general and in Central and Eastern Europe in particular. The study began by considering the constitutional and political environment of the constitutional courts' activities in controlling legislative and executive powers, which in all countries studied are based on the principles of the rule of law and the separation of powers. All courts are separate bodies with special status in terms of constitutional law and are independent of other political and judicial institutions. The range of matters within their jurisdiction is set by the constitution of the country in question but in all cases can be exercised only with the framework of procedural rules. This gives considerable significance to the question of who sets these rules and different countries have dealt with it in different ways. In some there is a special constitutional law with the same legal force as the constitution itself (Croatia), the majority of countries allow for regulation by an ordinary law, Macedonia gives the court the autonomy to create and change its own rules of procedure, while in Hungary the parliament fixes the rules on procedure at the suggestion of the constitutional court. The question of the appointment of constitutional judges was also considered and of the mechanisms for ensuring their impartiality and immunity. In the area of the courts' scope for providing normative control, considerable differences were found between the different countries. In some cases the courts' jurisdiction is limited to the normative acts of the respective parliaments, and there is generally no provision for challenging unconstitutional omissions by legislation and the executive. There are, however, some situations in which they may indirectly evaluate the constitutionality of legislative omissions, as when the constitution contains provision for a time limit on enacting legislation, when the parliament has made an omission in drafting a law which violates the constitutional provisions, or when a law grants favours to certain groups while excluding others, thereby violating the equal protection clause of the constitution. The control of constitutionality of normative acts can be either preventive or repressive, depending on whether it is implemented before or after the promulgation of the law or other enactment being challenged. In most countries in the region the constitutional courts provide only repressive control, although in Hungary and Poland the courts are competent to perform both preventive and repressive norm control, while in Romania the court's jurisdiction is limited to preventive norm control. Most countries are wary of vesting constitutional courts with preventive norm control because of the danger of their becoming too involved in the day-to-day political debate, but Mr. Cvetkovski points out certain advantages of such control. If combined with a short time limit it can provide early clarification of a constitutional issue, secondly it avoids the problems arising if a law that has been in force for some years is declared to be unconstitutional, and thirdly it may help preserve the prestige of the legislation. Its disadvantages include the difficulty of ascertaining the actual and potential consequences of a norm without the empirical experience of the administration and enforcement of the law, the desirability of a certain distance from the day-to-day arguments surrounding the political process of legislation, the possible effects of changing social and economic conditions, and the danger of placing obstacles in the way of rapid reactions to acute situations. In the case of repressive norm control, this can be either abstract or concrete. The former is initiated by the supreme state organs in order to protect abstract constitutional order and the latter is initiated by ordinary courts, administrative authorities or by individuals. Constitutional courts cannot directly oblige the legislature and executive to pass a new law and this remains a matter of legislative and executive political responsibility. In the case of Poland, the parliament even has the power to dismiss a constitutional court decision by a special majority of votes, which means that the last word lies with the legislature. As the current constitutions of Central and Eastern European countries are newly adopted and differ significantly from the previous ones, the courts' interpretative functions should ensure a degree of unification in the application of the constitution. Some countries (Bulgaria, Hungary, Poland, Slovakia and Russia) provide for the constitutional courts' decisions to have a binding role on the constitutions. While their decisions inevitably have an influence on the actions of public bodies, they do not set criteria for political behaviour, which depends rather on the overall political culture and traditions of the society. All constitutions except that of Belarus, provide for the courts to have jurisdiction over conflicts arising from the distribution of responsibilities between different organs and levels in the country, as well for impeachment procedures against the head of state, and for determining the constitutionality of political parties (except in Belarus, Hungary, Russia and Slovakia). All the constitutions studied guarantee individual rights and freedoms and most courts have jurisdiction over complaints of violation of these rights by the constitution. All courts also have some jurisdiction over international agreements and treaties, either directly (Belarus, Bulgaria and Hungary) before the treaty is ratified, or indirectly (Croatia, Czech Republic, Macedonia, Romania, Russia and Yugoslavia). In each country the question of who may initiate proceedings of norm control is of central importance and is usually regulated by the constitution itself. There are three main possibilities: statutory organs, normal courts and private individuals and the limitations on each of these is discussed in the report. Most courts are limited in their rights to institute ex officio a full-scale review of a point of law, and such rights as they do have rarely been used. In most countries courts' decisions do not have any binding force but must be approved by parliament or impose on parliament the obligation to bring the relevant law into conformity within a certain period. As a result, the courts' position is generally weaker than in other countries in Europe, with parliament remaining the supreme body. In the case of preventive norm control a finding of unconstitutionality may act to suspend the law and or to refer it back to the legislature, where in countries such as Romania it may even be overturned by a two-thirds majority. In repressive norm control a finding of unconstitutionality generally serves to take the relevant law out of legal force from the day of publication of the decision or from another date fixed by the court. If the law is annulled retrospectively this may or may not bring decisions of criminal courts under review, depending on the provisions laid down in the relevant constitution. In cases relating to conflicts of competencies the courts' decisions tend to be declaratory and so have a binding effect inter partes. In the case of a review of an individual act, decisions generally become effective primarily inter partes but is the individual act has been based on an unconstitutional generally binding normative act of the legislature or executive, the findings has quasi-legal effect as it automatically initiates special proceedings in which the law or other regulation is to be annulled or abrogated with effect erga omnes. This wards off further application of the law and thus further violations of individual constitutional rights, but also discourages further constitutional complaints against the same law. Thus the success of one individual's complaint extends to everyone else whose rights have equally been or might have been violated by the respective law. As the body whose act is repealed is obliged to adopt another act and in doing so is bound by the legal position of the constitutional court on the violation of constitutionally guaranteed freedoms and rights of the complainant, in this situation the decision of the constitutional court has the force of a precedent.