1000 resultados para Ação de reconhecimento da existência de contrato de trabalho
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
A presente invenção refere-se a um novo soro equino antiveneno de abelha (Apis melilfera ssp.), o método de reconhecimento e seu respectivo processo de obtenção, utilizando, como antígeno, o veneno de Apís Meilifera ssp. integral...
Resumo:
The law that justifies the inclusion of people with disability in schools and companies has been in force since the end of the 1980thies. In view of its coercion, people with disabilities have been enrolled at schools and been employed in companies. This research attempts to analyze the inclusion process according to Axel Honneth's Social Recognition Theory. Backed by his three dimension recognition process, we show firstly that inclusion signifies a process of individuation and social inclusion. Then, we study the law in force, its goals and strategies of achievement. We show that recognition's approach allows interpreting the law of inclusion more generously - in a less positivistic way. Finally, we approach the conditions for schools and companies to accomplish the law of inclusion so conceived.
Resumo:
The elderly are the object of policies of protection against risks and diseases. According to the liberal premise, the idea is ensure the individual's independence, which actually serves to isolating and weakening the elderly. We propose the paradigm of recognition and social bonds that support the life of individuals who exercise recognition and are recognized. Intersubjective autonomy is guaranteed through relations of affection/friendship, social esteem, recognition of rights and responsibilities and threatened by de-valuing attitudes, disrespect and violence. This contributes to the health of the elderly, by understanding exclusion, slander and trauma and supporting the care institution with a view to integrity and social justice.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
The aim of this paper is to show how the contract joins with moral and politics in Rousseau's Social contract. The contract denatures and changes human nature when human being becomes social. With this change, moral and politics arouse. Moral is the condition of liberty and politics becomes on the field of consent and rhetoric.
Resumo:
From one dimension of culture, the word boundary breaks away from the idea of territorial boundary defined a priori as something fixed to the delineation of boundaries. Released this commitment, it can be thought of in other dimensions: as of transition moments of identity experienced by individuals, for women, compared to established norms. Questioning the determinant and connected speech processes of change, they left the banks in which they lived and sought recognition of self, identity and new choices have taken up other possibilities for being, social inclusion, coupled with the guarantee of their rights. Recognizing the existence of this movement, I propose a look at border on the inclusion of women as widows in order to observe the multiple identities of their female protagonists. This reflection aims to take account of social fraying beyond the limits and directions in taxes and if the widow, to expand the boundaries of its meaning and consider the possibility of hybrid subjects, differentiated, and therefore mobile and moving all the time an ongoing performance of operations, as well as contemporary studies have shown about gender relations that take into account the distinctions of race, class, ethnicity, and especially for generations.
Resumo:
Pós-graduação em Direito - FCHS
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
In many movies of scientific fiction, machines were capable of speaking with humans. However mankind is still far away of getting those types of machines, like the famous character C3PO of Star Wars. During the last six decades the automatic speech recognition systems have been the target of many studies. Throughout these years many technics were developed to be used in applications of both software and hardware. There are many types of automatic speech recognition system, among which the one used in this work were the isolated word and independent of the speaker system, using Hidden Markov Models as the recognition system. The goals of this work is to project and synthesize the first two steps of the speech recognition system, the steps are: the speech signal acquisition and the pre-processing of the signal. Both steps were developed in a reprogrammable component named FPGA, using the VHDL hardware description language, owing to the high performance of this component and the flexibility of the language. In this work it is presented all the theory of digital signal processing, as Fast Fourier Transforms and digital filters and also all the theory of speech recognition using Hidden Markov Models and LPC processor. It is also presented all the results obtained for each one of the blocks synthesized e verified in hardware
Resumo:
This work aims to give greater visibility to the issue of software security, due to people talk a lot in security conferences, that much of both IT (Information Technology) staff and, more specifically, IS (Information Security) staff does not know this, and, thanks to the spread of the mobile computing and of the cloud computing, this lack of deeper knowledge on this subject is increasingly becoming worrisome. It aims too, make applications to be developed in a security manner, priorizing the security of the information processed. It attempts to demonstrate the secure coding techniques, the principles of software security, the means to identify software vulnerabilities, the cutting-edge software exploitation techniques and the mechanisms of mitigation. Nowadays, the security guys are in charge of the most of the security tests in applications, audits and pentests, and it is undeniable that the so-called security experts, most often come from computer network field, having few experience in software development and programming. Therefore, the development process does not consider the security issue, thanks to the lack of knowledge on the subject by the developer, and the security tests could be improved whether security experts had a greater know-how on application development. Given this problem, the goal here is to integrate information security with software development, spreading out the process of secure software development. To achieve this, a Linux distribution with proof of concept applicati... (Complete abstract click electronic access below)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)