767 resultados para Absentee voting


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This publication is produced by the Legislative Services Agency. This publication contains all election laws to be included in the 2014 Iowa Code. Changes in Code language to be included in the 2014 Iowa Code are marked by highlighting in yellow. Code sections with changes are also highlighted in yellow in the Table of Contents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In March of 2012, the Iowa Secretary of State’s office compared Iowa’s voter registration records with the driver’s license record s of individuals that identified themselves as non-citizens with the Iowa Department of Transportation. After comparing those records, the Iowa Secretary of State’s office found that more than 3,000 individuals registered to vote that had previously identified themselves as non-citizens. More than 1,000 of these individuals had also cast a ballot. The Iowa Secretary of State’s office was not given timely access to the federal Systematic Alien Verification for Entitlements (SAVE)database, and therefore was unable to determine if any of these individuals had become citizens before they registered to vote or cast a ballot. On June 21, 2012, the Iowa Secretary of State’s office entered into an agreement with the Iowa Department of Public Safety’s Division of Criminal Investigation (DCI) to review potential election misconduct crimes and improve the administration of federal elections. Over the last two years,DCI agents have reviewed thousands of instances of possible election misconduct. DCI’s review included cases referred by the Iowa Secretary of State’s office as well as by other state and local government agencies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Iowa Flood Mitigation Program is created within Code of Iowa, Chapter 418. The Program seeks to provide funds for flood mitigation projects that otherwise would not be funded. The Flood Mitigation Board is responsible for the implementation Code of Iowa Chapter 418. The membership of the Board is comprised of four voting public members appointed by the Governor, five voting members representing state agencies, and four non-voting ex-officio members of the legislature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This publication is produced by the Legislative Services Agency. This publication contains all election laws to be included in the 2014 Iowa Code. Changes in Code language to be included in the 2014 Iowa Code are marked by highlighting in yellow. Code sections with changes are also highlighted in yellow in the Table of Contents.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper models a legislature in which the same agenda setter serves for two periods, showing how he can exploit a legislature (completely) in the first period by promising future benefits to legislators who support him. In equilibrium, a large majority of legislators vote for the first-period proposal because they thereby maintain the chance of belonging to the minimum winning coalition in the future. Legislators may therefore approve policies by large majorities, or even unanimously, that benefit few, or even none, of them. The results are robust; but institutional arrangements (such as entitlements) can reduce the agenda setter's power by reducing his discretion to reward and punish legislators, and rules (such as sequential voting) can increase a legislator's ability to resist exploitation. Keywords: Legislative bargaining, distributive politics, agenda-setting, proposal power. JEL C72, D72, D78.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dentro del proceso de definición de las vías de participación en el PLAN DIRECTOR DE PARTICIPACIÓN CIUDADANA 2010-2015 del Ayuntamiento de Barcelona, se plantea la necesidad de fomentar mecanismos de participación directa y a, partir de esta necesidad, se plantea el desarrollo de una aplicación de Consultas Populares.Dentro de los procesos participativos, las consultas a realizar pueden ser vinculantes y por tanto resulta de la mayor importancia fundamentar su desarrollo garantizando la corrección formal de todo el proceso.Entre los requerimientos, especificados por en Instituto Municipal de Informática, el sistema de votación a plantear debe estar cubierto por alguna de las licencias consideradas libres o de código abierto. Una de las principales características de este tipo de aplicaciones es que resulta posible la utilización y modificación del código.Como primer paso se definen los conceptos básicos implicados comenzando con la del propio concepto de e-Voting. A partir de las experiencias previas realizadas en nuestro entorno geográfico, es posible establecer que los estándares más utilizados son los generados por el Consejo de Europa, qué utilizaremos para concretar las diferentes fases de un Proceso de Consulta, los actores implicados así como las diferentes funciones a de cada uno de ellos para cada una de las fases.Sobre esta base se analizan las diferentes alternativas existentes entre lo que se denominan Esquemas de Votación. Centrándonos en el escogido como más conveniente, el Esquema de Voto Oculto, se describen las características de seguridad que permiten dar validez a un proceso de consulta realizado por este medio. Así mismo se describen los principales conceptos teóricos implicados mediante una aproximación que permita su comprensión de forma intuitiva, especialmente en lo que se refiere a las técnicas criptográficas implicadas.En tercer lugar se ha realizado una búsqueda de posibles aplicaciones que sirvan de punto de partida y se han hecho pruebas comparativas para las cuales se han adaptado las herramientas correspondientes a QSOS, relacionando los estándares especificados por el Consejo Europeo y las características de seguridad que deben cumplirse.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction: Biological. therapy has dramatically changed management of Crohn's disease (CD). New data have confirmed the benefit and relative long-term safety of anti-TNF alpha inhibition as part of a regular scheduled administration programme. The EPACT appropriateness criteria for maintenance treatment after medically-induced remission (MIR) or surgically-induced remission (SIR) of CD thus required updating. Methods: A multidisciplinary international expert panel (EPACT II, Geneva, Switzerland) discussed and anonymously rated detailed, explicit clinical indications based on evidence in the literature and personal expertise. Median ratings (on a 9-point scale) were stratified into three assessment categories: appropriate (7-9), uncertain (4-6 and/or disagreement) and inappropriate (1-3). Experts ranked appropriate medication according to their own clinical practice, without any consideration of cost. Results: Three hundred and ninety-two specific indications for maintenance treatment of CD were rated (200 for MIR and 192 for SIR). Azathioprine, methotrexate and/or anti-TNF alpha antibodies were considered appropriate in 42 indications, corresponding to 68% of all appropriate interventions (97% of MIR and 39% of SIR). The remaining appropriate interventions consisted of mesalazine and a "wait-and-see" strategy. Factors that influenced the panel's voting were patient characteristics and outcome of previous treatment. Results favour use of anti-TNF alpha agents after failure of any immunosuppressive therapy, while earlier primary use remains controversial. Conclusion: Detailed explicit appropriateness criteria (EPACT) have been updated for maintenance treatment of CD. New expert recommendations for use of the classic immunosuppressors as well as anti-TNF alpha agents are now freely available online (www.epact.ch). The validity of these criteria should now be tested by prospective evaluation. (C) 2009 European Crohn's and Colitis Organisation. Published by Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En la propuesta de proyecto del IMI (Instituto Municipal de Informática) se fija como objetivo la definición, arquitectura y diseño de un sistema informático distribuido que permita la realización de consultas populares, garantizando la confidencialidad, seguridad, sincronía y posibilidad de acceso móvil.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Iowa Flood Mitigation Program is created within Code of Iowa, Chapter 418. The Program seeks to provide funds for flood mitigation projects that otherwise would not be funded. The Flood Mitigation Board is responsible for the implementation Code of Iowa Chapter 418. The membership of the Board is comprised of four voting public members appointed by the Governor, five voting members representing state agencies, and four non-voting ex-officio members of the legislature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Iowa Flood Mitigation Program is created within Code of Iowa, Chapter 418. The Program seeks to provide funds for fl ood mitigation projects that otherwise would not be funded. The Flood Mitigation Board is responsible for the implementation of Code of Iowa Chapter 418. The membership of the Board is comprised of four voting public members appointed by the Governor, five voting members representing state agencies, four non-voting ex officio members of the legislature, and one non-voting ex officio member representing a state agency.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This document summarizes the discussion and findings of the 4th workshop held on October 27–28, 2015 in Frankfort, Kentucky as part of the Technology Transfer Intelligent Compaction Consortium (TTICC) Transportation Pooled Fund (TPF-5(233)) study. The TTICC project is led by the Iowa Department of Transportation (DOT) and partnered by the following state DOTs: California, Georgia, Iowa, Kentucky, Missouri, Ohio, Pennsylvania, Virginia, and Wisconsin. The workshop was hosted by the Kentucky Transportation Cabinet and was organized by the Center for Earthworks Engineering Research (CEER) at Iowa State University of Science and Technology. The objective of the workshop was to generate a focused discussion to identify the research, education, and implementation goals necessary for advancing intelligent compaction for earthworks and asphalt. The workshop consisted of a review of the TTICC goals, state DOT briefings on intelligent compaction implementation activities in their state, voting and brainstorming sessions on intelligent compaction road map research and implementation needs, and identification of action items for TTICC, industry, and Federal Highway Administration (FHWA) on each of the road map elements to help accelerate implementation of the technology. Twenty-three attendees representing the state DOTs participating in this pooled fund study, the FHWA, Iowa State University, University of Kentucky, and industry participated in this workshop.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Care for patients with colon and rectal cancer has improved in the last twenty years however still considerable variation exists in cancer management and outcome between European countries. Therefore, EURECCA, which is the acronym of European Registration of cancer care, is aiming at defining core treatment strategies and developing a European audit structure in order to improve the quality of care for all patients with colon and rectal cancer. In December 2012 the first multidisciplinary consensus conference about colon and rectum was held looking for multidisciplinary consensus. The expert panel consisted of representatives of European scientific organisations involved in cancer care of patients with colon and rectal cancer and representatives of national colorectal registries. Methods: The expert panel had delegates of the European Society of Surgical Oncology (ESSO), European Society for Radiotherapy & Oncology (ESTRO), European Society of Pathology (ESP), European Society for Medical Oncology (ESMO), European Society of Radiology (ESR), European Society of Coloproctology (ESCP), European CanCer Organisation (ECCO), European Oncology Nursing Society (EONS) and the European Colorectal Cancer Patient Organisation (EuropaColon), as well as delegates from national registries or audits. Experts commented and voted on the two web-based online voting rounds before the meeting (between 4th and 25th October and between the 20th November and 3rd December 2012) as well as one online round after the meeting (4th20th March 2013) and were invited to lecture on the subjects during the meeting (13th15th December 2012). The sentences in the consensus document were available during the meeting and a televoting round during the conference by all participants was performed. All sentences that were voted on are available on the EURECCA website www.canceraudit.eu. The consensus document was divided in sections describing evidence based algorithms of diagnostics, pathology, surgery, medical oncology, radiotherapy, and follow-up where applicable for treatment of colon cancer, rectal cancer and stage IV separately. Consensus was achieved using the Delphi method. Results: The total number of the voted sentences was 465. All chapters were voted on by at least 75% of the experts. Of the 465 sentences, 84% achieved large consensus, 6% achieved moderate consensus, and 7% resulted in minimum consensus. Only 3% was disagreed by more than 50% of the members. Conclusions: It is feasible to achieve European Consensus on key diagnostic and treatment issues using the Delphi method. This consensus embodies the expertise of professionals from all disciplines involved in the care for patients with colon and rectal cancer. Diagnostic and treatment algorithms were developed to implement the current evidence and to define core treatment guidance for multidisciplinary team management of colon and rectal cancer throughout Europe.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This bachelor's degree thesis deals with homomorphic public-key cryptography, or in other words cryptosystems with special addition properties. Such cryptosystems are widely used in real life situations, for instance to make electronic voting secure. In Chapter 1 a few basic algebra results and other key concepts are introduced. Chapters 2 and 3 contain the algorithms and properties of the two cryptosystems which are considered to be the best for e-voting: Paillier and Joye-Libert. The thesis is concluded in Chapter 4, by comparing running times of the two above-mentioned cryptosystems, in simulations of real-life e-voting systems, with up to tens of thousands of voters, and different levels of security. Through these simulations, we discern the situations where each of the two cryptosystems is preferable.

Relevância:

10.00% 10.00%

Publicador: