821 resultados para Gaining access
Resumo:
Depuis plusieurs années, les États membres de l’Union européenne (UE) se soumettent à des politiques restrictives, en matière d’asile, qui les contraignent à respecter leur engagement de protéger les personnes qui fuient la persécution. Plusieurs politiques de dissuasion de l’UE sont controversées. Certaines ont d’abord été élaborées dans différents États, avant que l’UE ne mette en place une politique commune en matière d’asile. Certaines des ces politiques migratoires ont été copiées, et ont un effet négatif sur la transformation des procédures d’asile et du droit des réfugiés dans d’autres pays, tel le Canada. En raison des normes minimales imposées par la législation de l’UE, les États membres adoptent des politiques et instaurent des pratiques, qui sont mises en doute et sont critiquées par l’UNHCR et les ONG, quant au respect des obligations internationales à l'égard des droits de la personne. Parmi les politiques et les pratiques les plus critiquées certaines touchent le secteur du contrôle frontalier. En tentant de remédier à l’abolition des frontières internes, les États membres imposent aux demandeurs d’asile des barrières migratoires quasi impossibles à surmonter. Les forçant ainsi à s’entasser dans des centres de migration, au nord de l’Afrique, à rebrousser chemin ou encore à mourir en haute mer.
Resumo:
Ce mémoire analyse les articles et les publicités représentant les loisirs diffusés dans la Revue moderne et Châtelaine après la Seconde Guerre mondiale. Phénomène grandissant à l’ère de la consommation de masse, les loisirs sont de plus en plus populaires et l’abondance de leurs représentations illustre leur importance, notamment auprès des familles de la classe moyenne qui bénéficient de plus en plus de ressources pour en profiter. Ces représentations, utilisées pour faire la promotion de produits à usage quotidien, de produits du tourisme ou de conseils pour les vacances, semblent à première vue illustrer certains aspects de la vie quotidienne des Québécois, mais diffusent principalement certaines valeurs encouragées par la société d’après-guerre. En effet, plusieurs stéréotypes de genre peuvent être observés, dont celui de la mère ménagère et celui du père pourvoyeur. En plus d’être véhiculées dans les médias et par l’ensemble des acteurs sociaux de l’époque, les valeurs associées à la domesticité, la féminité, la masculinité et à la famille nucléaire se retrouvent jusque dans les loisirs, accessibles à de plus en plus de familles.
Resumo:
Commentaire / Commentary
Resumo:
Dans une société mondialisée, où les relations sont intégrées à une vitesse différente avec l'utilisation des technologies de l'information et des communications, l'accès à la justice gagne de nouveaux concepts, mais elle est encore confrontée à de vieux obstacles. La crise mondiale de l'accès à la justice dans le système judiciaire provoque des débats concernant l'égalité en vertu de la loi, la capacité des individus, la connaissance des droits, l'aide juridique, les coûts et les délais. Les deux derniers ont été les facteurs les plus importants du mécontentement des individus avec le système judiciaire. La présente étude a pour objet d'analyser l'incidence de l'utilisation de la technologie dans l’appareil judiciaire, avec l'accent sur la réalité brésilienne, la voie législative et des expériences antérieures dans le développement de logiciels de cyberjustice. La mise en œuvre de ces instruments innovants exige des investissements et de la planification, avec une attention particulière sur l'incidence qu'ils peuvent avoir sur les routines traditionnelles des tribunaux. De nouveaux défis sont sur la voie de ce processus de transformation et doivent être traités avec professionnalisme afin d'éviter l'échec de projets de qualité. En outre, si la technologie peut faire partie des différents aspects de notre quotidien et l'utilisation de modes alternatifs de résolution des conflits en ligne sont considérés comme un succès, pourquoi serait-il difficile de faire ce changement dans la prestation de la justice par le système judiciaire? Des solutions technologiques adoptées dans d'autres pays ne sont pas facilement transférables à un environnement culturel différent, mais il y a toujours la possibilité d'apprendre des expériences des autres et d’éviter de mauvaises voies qui pourraient compromettre la définition globale de l'accès à la justice.
Resumo:
This article discusses the relationship between digital humanities and disciplinary boundaries in the last decade, primarily in the context of the national project Synergies. It offers first an overview of Synergies as a concrete example of the way technological change impacts the very notion of disciplines by trying to create a platform that was interdisciplinary by nature, then discusses the creation of a new Digital Humanities centre in Québec—Le Centre de recherche interuniversitaire sur les humanités numériques – and the ways it was conceived as encompassing a range of disciplinary approach.
Resumo:
Parallel legal systems can and do exist within a single sovereign nation, and rural Guatemala offers one example. Such parallel systems are generally viewed as failures of legal penetration which compromise the rule of law. The question addressed in this paper is whether the de facto existence of parallel systems in Guatemala benefits the indigenous population, or whether the ultimate goal of attaining access to justice requires a complete overhaul of the official legal system. Ultimately, the author concludes that while the official justice system needs a lot of work in order to expand access to justice, especially for the rural poor, the existence of a parallel legal system can be a vehicle for, rather than a hindrance to, expanding such access.
Resumo:
Chronic catheterization is illustrated using vascular-access-port model SLA where the port is surgically placed subcutaneously on the back of the rat. The catheter is tunnelled to the neck and inserted into the jugular vein . Within 24 h rats showed normal blood pressure and blood samples were collected at intervals with minimal stress to the animals . A comparison of the plasma catecholamine of blood collected from vascular-access-ports with that obtained from decapitation indicates that there was minimal stress to the rats when blood was drawn through the vascular-access-port.
Resumo:
This Thesis deals with the fabrication and characterization of novel all-fiber components for access networks. All fiber components offer distinctive advantages due to low forward and backward losses, epoxy free optical path and high power handling. A novel fabrication method for monolithic 1x4 couplers, which are vital components in distributed passive optical networks, is realized. The fabrication method differs from conventional structures with a symmetric coupling profile and hence offers ultra wideband performance and easy process control. New structure for 1x4 couplers, by fusing five fibers is proposed to achieve high uniformity, which gives equivalent uniformity performance to 1x4 planar lightwave splitters, isolation in fused fiber WDM is improved with integration of long period gratings. Packaging techniques of fused couplers are analyzed for long term stability.
Resumo:
A compact dual-band printed antenna covering the 2.4 GHz (2400-2485 MHz) and 5.2 GHz (5150-5350 MHz) WLAN bands is presented. The experimental analysis shows a 2:1 VSWR bandwidth of up to 32 and 8% for 2.4 and 5.2 GHz, respectively. The measured radiation patterns are nearly omnidirectional, with moderate gain in both the WLAN bands.
Resumo:
In light of the various international instruments and international agencies that are actively engaged in resolving the issue of ABS, the present work tries to find an answer to the larger question how far the above agencies have succeeded in regulating access and make sure of benefit sharing. In this process, the work comprehensively analyses the work of different agencies involved in the process. It tries to find out the major obstacles that stand in the way of fulfilment of the benefit sharing objective and proposes the ways and means to tackle them. The study first traces the legal foundations of the concept of property in GRs and associated TK.For this, it starts with analysis of the nature of property and the questions related to ownership in GRs as contained in the CBD as well as in various State legislations. It further examines the notion of property before and after the enactment of the CBD and establishes that the CBD contains strong private property jurisprudence.Based on the theoretical foundation of private property right,Chapter 3 analyses the benefit sharing mechanism of the CBD, i.e. the Nagoya Protocol. It searches for a theoretical convergence of the notion of property as reflected in the two instruments and successfully establishes the same. It makes an appraisal of the Nagoya regime to find out how far it has gone beyond the CBD in ensuring the task of benefit sharing and the impediments in its way.Realizing that the ITPGRFA forms part of the CBD system, Chapter 4 analyses the benefit sharing structure of ITPGRFA as revealed through its multilateral system. This gives the work the benefit of comparing two different benefit sharing models operating on the same philosophy of property. This chapter tries to find out whether there is conceptual coherence in the notion of property when the benefit sharing model changes. It alsocompares the merits and demerits of both the systems and tries to locate the hurdles in achieving benefit sharing. Aware of the legal impediments caused by IPRs in the process of ABS, Chapter 5 tries to explore the linkages between IPRs and GRs and associated TK and assesses why contract-based CBD system fails before the monopoly rights under TRIPS. Chapter 6 analyses the different solutions suggested by the international community at the TRIPS Council as well as the WIPO (World Intellectual property Organisation) and examines their effectiveness. Chapter 7 concludes that considering the inability of the present IP system to understand the grass root realities of the indigenous communities as well as the varying situations of the country of origin, the best possible way to recognise the CBD goals in the TRIPS could be better achieved through linking the two instruments by means of the triple disclosure requirement in Article 29 as suggested by the Disclosure Group during the TRIPS Council deliberations. It also recommends that considering the nature of property in GR, a new section/chapter in the TRIPS dealing with GRs would be another workable solution.
Resumo:
The present work focuses on various facets of open access movement for managing intellectual output that eventually becomes available and accessible in public domain. Thus, purpose of this paper is to document and share the real time experience of managing and sharing of intellectual wealth of academia of Cochin University of Science & Technology by using open source platforms. This paper is trying to explore different intellectual information resources in the current era and also aims to suggest cost effective strategy of implementing new open access tools and technology for effective managing ofintellectual informatics
Resumo:
In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.
Resumo:
This paper aims to describe recent developments in the services provided by Indian electronic thesis and dissertation (ETD) repositories. It seeks to explore the prospect of knowledge formation and diffusion in India and to discuss the potential of open access e-theses repositories for knowledge management.This study is based on literature review and content analysis of IndianETDrepository websites. Institutional repositories and electronic thesis and dissertation projects in India were identified through a literature survey as well as internet searching and browsing. The study examines the tools, type of contents, coverage and aims of Indian ETD repositories.The paper acknowledges the need for knowledge management for national development. It highlights the significance of an integrated platform for preserving, searching and retrieving Indian theses. It describes the features and functions of Indian ETD repositories.The paper provides insights into the characteristics of the national repository of ETDs of India, which encourage and support open access to publicly-funded research