951 resultados para Power law creep


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Discriminatory language became an important social issue in the west in the late twentieth century, when debates on political correctness and minority rights focused largely on the issue of respect in language. Japan is often criticized for having made only token attempts to address this issue. This paper investigates how one marginalized group—people with disabilities—has dealt with discriminatory and disrespectful language. The debate has been played out in four public spaces: the media, the law, literature, and the Internet. The paper discusses the kind of language, which has generated protest, the empowering strategies of direct action employed to combat its use, and the response of the media, the bureaucracy, and the literati. Government policy has not kept pace with social change in this area; where it exists at all, it is often contradictory and far from clear. I argue that while the laws were rewritten primarily as a result of external international trends, disability support groups achieved domestic media compliance by exploiting the keen desire of media organizations to avoid public embarrassment. In the absence of language policy formulated at the government level, the media effectively instituted a policy of self-censorship through strict guidelines on language use, thereby becoming its own best watchdog. Disability support groups have recently enlisted the Internet as an agent of further empowerment in the ongoing discussion of the issue.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The creep rupture properties of cast ½Cr½Mo¼V and 1Cr1Mo¼V alloy steel used in the manufacture of power station steam generating plant. have been investigated. The effects of constraint and geometry on the creep rupture properties are also considered. The validity of various criteria controlling macroscopic creep crack growth in cast CrMoV alloys has been examined. It is found that neither the stress intensity factor nor reference stress correlate satisfactorily the creep crack growth rates at the test temperature of 550°C. Certain minimum displacements must be achieved for crack initiation and propagation. It is found that this displacement as measured by crack opening displacement or crack aspect ratio, is the same in both compact tension and centre-cracked panel geometries, is invariant with crack length and decreases with increasing constraint. The effect of constraint on creep crack growth rate in the two geometries is less conclusive. A new model describing creep crack growth in cast CrMoV alloy steels has been developed. The model is based on the results from a numerical finite element creep analysis of the relaxation and redistribution of stress ahead of an incubating creep crack . It is found that macroscopic creep crack growth in a material undergoing either plane stress or plane strain deformation can be described by a fracture stress which is based on the Von Mises equivalent stress. It has been shown that this model is capable of rationalising all of the experimental crack velocity data from the cast CrMoV alloys. The resultant degree of data correlation is far superior to that obtained when using the stress intensity factor or reference stress. A cumulative damage creep fracture model based upon the results from the numerical analysis has been developed. It is found that the model is capable of predicting the behaviour of propagating creep cracks in cast CrMoV alloys from smooth bar creep rupture data.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Tobacco companies are increasingly turning to trade and investment agreements to challenge measures aimed at reducing tobacco use. This study examines their efforts to influence the Trans-Pacific Partnership (TPP), a major trade and investment agreement which may eventually cover 40% of the world's population; focusing on how these efforts might enhance the industry's power to challenge the introduction of plain packaging. Specifically, the paper discusses the implications for public health regulation of Philip Morris International's interest in using the TPP to: shape the bureaucratic structures and decision-making processes of business regulation at the national level; introduce a higher standard of protection for trademarks than is currently provided under the Agreement on Trade Related Aspects of Intellectual Property Rights; and expand the coverage of Investor-State Dispute Settlement which empowers corporations to litigate directly against governments where they are deemed to be in breach of investment agreements. The large number of countries involved in the TPP underlines its risk to the development of tobacco regulation globally.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A hagyományos szavazási játékok speciális átruházható hasznosságú, kooperatív játékok, úgynevezett egyszerű játékok, ahol a játékosok a pártok, és az egyes koalíciók értéke 1 vagy 0 attól függően, hogy az adott koalíció elég erős-e az adott jogszabály elfogadásához, vagy sem. Ebben a cikkben bevezetjük az általánosított súlyozott szavazási játékok fogalmát, ahol a pártok mandátumainak száma a valószínűségi változó. Magyar példákon keresztül mutatjuk be az új megközelítés használhatóságát. / === / Voting games are cooperative games with transferable utility, so-called simple games, where the players are parties and the value of a coalition may be 0 or 1 depending on its ability to pass a new law. The authors introduce the concept of generalized weighted voting games where the parties' strengths are random variables. taking examples from Hungary to illustrate the use of this approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study explores how great powers not allied with the United States formulate their grand strategies in a unipolar international system. Specifically, it analyzes the strategies China and Russia have developed to deal with U.S. hegemony by examining how Moscow and Beijing have responded to American intervention in Central Asia. The study argues that China and Russia have adopted a soft balancing strategy of to indirectly balance the United States at the regional level. This strategy uses normative capabilities such as soft power, alternative institutions and regionalization to offset the overwhelming material hardware of the hegemon. The theoretical and methodological approach of this dissertation is neoclassical realism. Chinese and Russian balancing efforts against the United States are based on their domestic dynamics as well as systemic constraints. Neoclassical realism provides a bridge between the internal characteristics of states and the environment which those states are situated. Because China and Russia do not have the hardware (military or economic power) to directly challenge the United States, they must resort to their software (soft power and norms) to indirectly counter American preferences and set the agenda to obtain their own interests. Neoclassical realism maintains that soft power is an extension of hard power and a reflection of the internal makeup of states. The dissertation uses the heuristic case study method to demonstrate the efficacy of soft balancing. Such case studies help to facilitate theory construction and are not necessarily the demonstrable final say on how states behave under given contexts. Nevertheless, it finds that China and Russia have increased their soft power to counterbalance the United States in certain regions of the world, Central Asia in particular. The conclusion explains how soft balancing can be integrated into the overall balance-of-power framework to explain Chinese and Russian responses to U.S. hegemony. It also suggests that an analysis of norms and soft power should be integrated into the study of grand strategy, including both foreign policy and military doctrine.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper is a constructivist attempt to understand a global political space where states as actors (the traditional domain of international relations theory and international law) are joined by international organizations, firms, NGOs, and others. Today we know that many supposedly private or international orders (meaning sources of order other than the central institutions of the territorial state) are engaged in the regulation of large domains of collective life in a world where the sources of power are multiple, sovereignties are overlapping, and anarchy is meaningless. The paper begins with an attempt, discussed in the first section, to sort out what the rule of law might mean in the context of the WTO, where we soon see that it can only be understood by also considering the meaning of Administrative Law. Much of the debate about rule of law depends on positivist and centralist theories of “law,” whose inadequacy for my purposes leads, in the second section, to a discussion of legal pluralism and implicit law in legal theory. These approaches offer an alternative theoretical framework that respects the role of the state while not seeing it as the only source of normativity. The third section looks directly at WTO law and dispute settlement. I tr y to show that the sources and interpretations of law in the WTO and the trading system cannot be reduced to the Dispute Settlement Body. I conclude in the fourth section with some suggestions on how a WTO rule of law could be understood as democratic.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

At all normative levels, family migration law can disproportionally and negatively affect immigrant women’s rights in this field, producing gendered effects. In some cases, such effects are related to the normative and judicial imposition of unviable family-related models (e.g., the ʻgood mother ̕ the one-breadwinner family, or a rigid distinction between productive and reproductive work). In other cases, they are due to family migration law’s overlooking of the specific needs and difficulties of immigrant women, within their families and in the broader context of their host countries’ social and normative framework.To effectively expose and correct this gender bias, in this article I propose an alternative view of immigrant women’s right to family life, as a cluster of rights and entitlements rather than as a mono-dimensional right. As a theoretical approach, this construction is better equipped to capture the complex experiences of immigrant women in the European legal space, and to shed light on the gendered effects generated not by individual norms but by the interaction of norms that are traditionally assigned to separated legal domains (e.g., immigration law and criminal law). As a judicial strategy, this understanding is capable of prompting a consideration by domestic and supranational courts of immigrant women not as isolated individuals, but as ‘individuals in context’. I shall define this type of approach as ‘contextual interpretation’, understood as the consideration of immigrant women in the broader contexts of their families, their host societies and the normative frameworks applicable to them. Performed in a gendersensitive manner, a contextual judicial interpretation has the potential to neutralize the gendered effects of certain family migration norms. To illustrate these points, I will discuss selected judicial examples offered by the European Court on Human Rights, as well as from domestic jurisdictions of countries with a particularly high incidence of immigrant women (Italy and Spain).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article discusses the concept of right and its identification with the power to coerce, to show a reciprocity between the original contract and the right, as a manifestation of the reciprocity between moral law and freedom, as Kant states in its Second Critique. The demonstration of this view will allow a republican stance evident in the legal and political thought of Kant, since the right of a people can only exist while the town itself is unified to enact.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cette thèse examine l’interprétation et l’application, par l’Haute Cour d'Israël (HCJ), de principes du droit international de l’occupation et du droit international des droits de la personne dans le traitement de requêtes judiciaires formulées par des justiciables palestiniens. Elle s’intéresse plus particulièrement aux jugements rendus depuis le déclenchement de la deuxième Intifada (2000) suite à des requêtes mettant en cause la légalité des mesures adoptées par les autorités israéliennes au nom d’un besoin prétendu d’accroitre la sécurité des colonies et des colons israéliens dans le territoire occupé de la Cisjordanie. La première question sous étude concerne la mesure dans laquelle la Cour offre un recours effectif aux demandeurs palestiniens face aux violations alléguées de leurs droits internationaux par l’occupant. La recherche fait sienne la position de la HJC selon laquelle le droit de l’occupation est guidé par une logique interne tenant compte de la balance des intérêts en cause, en l’occurrence le besoin de sécurité de l’occupant, d’une part, et les droits fondamentaux de l’occupé, d’autre part. Elle considère, en outre, que cette logique se voit reflétée dans les principes normatifs constituant la base de ce corpus juridique, soit que l’occupation est par sa nature temporaire, que de l’occupation découle un rapport de fiduciaire et, finalement, que l’occupant n’acquiert point de souveraineté sur le territoire. Ainsi, la deuxième question qui est posée est de savoir si l’interprétation du droit par la Cour (HCJ) a eu pour effet de promouvoir ces principes normatifs ou, au contraire, de leur porter préjudice. La réunion de plusieurs facteurs, à savoir la durée prolongée de l’occupation de la Cisjordanie par Israël, la menace accrue à la sécurité depuis 2000 ainsi qu’une politique de colonisation israélienne active, soutenue par l’État, présentent un cas de figure unique pour vérifier l’hypothèse selon laquelle les tribunaux nationaux des États démocratiques, généralement, et ceux jouant le rôle de la plus haute instance judiciaire d’une puissance occupante, spécifiquement, parviennent à assurer la protection des droits et libertés fondamentaux et de la primauté du droit au niveau international. Le premier chapitre présente une étude, à la lumière du premier principe normatif énoncé ci-haut, des jugements rendus par la HCJ dans les dossiers contestant la légalité de la construction du mur à l’intérieur de la Cisjordanie et de la zone dite fermée (Seam Zone), ainsi que des zones de sécurité spéciales entourant les colonies. Le deuxième chapitre analyse, cette fois à la lumière du deuxième principe normatif, des jugements dans les dossiers mettant en cause des restrictions sur les déplacements imposées aux Palestiniens dans le but allégué de protéger la sécurité des colonies et/ou des colons. Le troisième chapitre jette un regard sur les jugements rendus dans les dossiers mettant en cause la légalité du tracé du mur à l’intérieur et sur le pourtour du territoire annexé de Jérusalem-Est. Les conclusions découlant de cette recherche se fondent sur des données tirées d’entrevues menées auprès d’avocats israéliens qui s’adressent régulièrement à la HCJ pour le compte de justiciables palestiniens.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This manual contains a summary of acquisition policy and makes recommendations to implement law and policy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Like many Americans across the country, Michigan residents have faced a staggering number of foreclosures in the last few years.2 In 2009, Laura Buttazzoni was one of the many Michigan homeowners facing the dire reality that she was going to lose her home.3 After Buttazzoni’s failed attempt to sell her home, her bank initiated a sheriff’s sale in late 2009.4 After the statutory redemption period expired,5 Fannie Mae evicted Buttazzoni and relisted the home in 2011.6 Even though Buttazzoni’s home was foreclosed, sold at a sale, and relisted on the market—she was not done with the property. In June 2012, nearly three years after Buttazzoni’s eviction, Fannie Mae executed an “expungement affidavit,” which voided the 2009 sheriff’s sale and reverted the mortgage back to Buttazzoni’s name.