749 resultados para Colombian-Ecuadorian border


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The export market for Australian wine continues to grow at a rapid rate, with imported wines also playing a role in market share in sales in Australia. It is estimated that over 60 per cent of all Australian wine is exported, while 12 per cent of wine consumed in Australia has overseas origins. In addition to understanding the size and direction (import or export) of wines, the foreign locales also play an important role in any tax considerations. While the export market for Australian produced alcohol continues to grow, it is into the Asian market that the most significant inroads are occurring. Sales into China of bottled wine over $7.50 per litre recently overtook the volume sold our traditional partners of the United States and Canada. It is becoming easier for even small to medium sized businesses to export their services or products overseas. However, it is vital for those businesses to understand the tax rules applying to any international transactions. Specifically, one of the first tax regimes that importers and exporters need to understand once they decide to establish a presence overseas is transfer pricing. These are the rules that govern the cross-border prices of goods, services and other transactions entered into between related parties. This paper is Part 2 of the seminar presented on transfer pricing and international tax issues which are particularly relevant to the wine industry. The predominant focus of Part 2 is to discuss four key areas likely to affect international expansion. First, the use of the available transfer pricing methodologies for international related party transactions is discussed. Second, the affects that double tax agreements will have on taking a business offshore are considered. Third, the risks associated with aggressive tax planning through tax information exchange agreements is reviewed. Finally, the paper predicts future ‘trip-wires’ and areas to ‘watch out for’ for practitioners dealing with clients operating in the international arena.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The recognition and enforcement of foreign judgments is an aspect of private international law, and concerns situations where a successful party to litigation seeks to rely on a judgment obtained in one court, in a court in another jurisdiction. The most common example where the recognition and enforcement of foreign judgments may arise is where a party who has obtained a favourable judgment in one state or country may seek to recognise and enforce the judgment in another state or country. This occurs because there is no sufficient asset in the state or country where the judgment was rendered to satisfy that judgment. As technological advancements in communications over vast geographical distances have improved exponentially in recent years, there has been an increase in cross-border transactions, as well as litigation arising from these transactions. As a result, the recognition and enforcement of foreign judgments is of increasing importance, since a party who has obtained a judgment in cross-border litigation may wish to recognise and enforce the judgment in another state or country, where the defendant’s assets may be located without having to re-litigate substantive issues that have already been resolved in another court. The purpose of the study is to examine whether the current state of laws for the recognition and enforcement of foreign judgments in Australia, the United States and the European Community are in line with modern-commercial needs. The study is conducted by weighing two competing objectives between the notion of finality of litigation, which encourages courts to recognise and enforce judgments foreign to them, on the one hand, and the adequacy of protection to safeguard the recognition and enforcement proceedings, so that there would be no injustice or unfairness if a foreign judgment is recognised and enforced, on the other. The findings of the study are as follows. In both Australia and the United States, there is a different approach concerning the recognition and enforcement of judgments rendered by courts interstate or in a foreign country. In order to maintain a single and integrated nation, there are constitutional and legislative requirements authorising courts to give conclusive effects to interstate judgments. In contrast, if the recognition and enforcement actions involve judgments rendered by a foreign country’s court, an Australian or a United States court will not recognise and enforce the foreign judgment unless the judgment has satisfied a number of requirements and does not fall under any of the exceptions to justify its non-recognition and non-enforcement. In the European Community, the Brussels I Regulation which governs the recognition and enforcement of judgments among European Union Member States has created a scheme, whereby there is only a minimal requirement that needs to be satisfied for the purposes of recognition and enforcement. Moreover, a judgment that is rendered by a Member State and based on any of the jurisdictional bases set forth in the Brussels I Regulation is entitled to be recognised and enforced in another Member State without further review of its underlying jurisdictional basis. However, there are concerns as to the adequacy of protection available under the Brussels I Regulation to safeguard the judgment-enforcing Member States, as well as those against whom recognition or enforcement is sought. This dissertation concludes by making two recommendations aimed at improving the means by which foreign judgments are recognised and enforced in the selected jurisdictions. The first is for the law in both Australia and the United States to undergo reform, including: adopting the real and substantial connection test as the new jurisdictional basis for the purposes of recognition and enforcement; liberalising the existing defences to safeguard the application of the real and substantial connection test; extending the application of the Foreign Judgments Act 1991 (Cth) in Australia to include at least its important trading partners; and implementing a federal statutory scheme in the United States to govern the recognition and enforcement of foreign judgments. The second recommendation is to introduce a convention on jurisdiction and the recognition and enforcement of foreign judgments. The convention will be a convention double, which provides uniform standards for the rules of jurisdiction a court in a contracting state must exercise when rendering a judgment and a set of provisions for the recognition and enforcement of resulting judgments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a computationally efficient image border pixel based watermark embedding scheme for medical images. We considered the border pixels of a medical image as RONI (region of non-interest), since those pixels have no or little interest to doctors and medical professionals irrespective of the image modalities. Although RONI is used for embedding, our proposed scheme still keeps distortion at a minimum level in the embedding region using the optimum number of least significant bit-planes for the border pixels. All these not only ensure that a watermarked image is safe for diagnosis, but also help minimize the legal and ethical concerns of altering all pixels of medical images in any manner (e.g, reversible or irreversible). The proposed scheme avoids the need for RONI segmentation, which incurs capacity and computational overheads. The performance of the proposed scheme has been compared with a relevant scheme in terms of embedding capacity, image perceptual quality (measured by SSIM and PSNR), and computational efficiency. Our experimental results show that the proposed scheme is computationally efficient, offers an image-content-independent embedding capacity, and maintains a good image quality

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Keeping exotic plant pests out of our country relies on good border control or quarantine. However with increasing globalization and mobilization some things slip through. Then the back up systems become important. This can include an expensive form of surveillance that purposively targets particular pests. A much wider net is provided by general surveillance, which is assimilated into everyday activities, like farmers checking the health of their crops. In fact farmers and even home gardeners have provided a front line warning system for some pests (eg European wasp) that could otherwise have wreaked havoc. Mathematics is used to model how surveillance works in various situations. Within this virtual world we can play with various surveillance and management strategies to "see" how they would work, or how to make them work better. One of our greatest challenges is estimating some of the input parameters : because the pest hasn't been here before, it's hard to predict how well it might behave: establishing, spreading, and what types of symptoms it might express. So we rely on experts to help us with this. This talk will look at the mathematical, psychological and logical challenges of helping experts to quantify what they think. We show how the subjective Bayesian approach is useful for capturing expert uncertainty, ultimately providing a more complete picture of what they think... And what they don't!

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Immigration to Australia has long been the focus of negative political interest. In recent times, the proposal of exclusionary policies such as the Malaysia Deal in 2011 has fuelled further debate. In these debates, Federal politicians often describe asylum seekers and refugees as ‘illegal’, ‘queue jumpers’, and ‘boat people’. This paper investigates how the political discourse constructs asylum seekers and refugees during debates surrounding the Malaysia Deal in the Federal Parliament of Australia in 2011. Hansard Parliamentary debates were analysed to identify the underlying themes and constructions that permeate political discourse about asylum seekers and refugees. This paper argues that a dichotomous characterisation of legitimacy pervades their construction with this group constructed either as legitimate humanitarian refugees or as illegitimate ‘boat arrivals’. These constructions result in the misrepresentation of asylum seekers as illegitimate, undermining their right to protection under Australia’s laws and international obligations. This construction also represents a shift in federal political discourse from constructing asylum seekers as a border or security threat, towards an increasing preoccupation with this categorisation of people as legitimate, or illegitimate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The pertinence of this book cannot be overemphasised. The world’s refugee crisis has reached a two‐decade high with the United Nations recently announcing that ‘displacement is the new 21st century challenge’ (UNHCR 2013). The transnational movement of dislocated peoples fleeing conflict, persecution and poverty is a global responsibility requiring nation states to collaborate for humanitarian resolutions embedded in human rights. However, in times of human rights expansionism, and the relaxation of borders for maximising free‐trade and fiscal prosperity, the movement of people experiencing immense abuse and deprivation has witnessed an increase in draconian regulation within discourses of intolerance and deterrence. Weber and Pickering cogently and emphatically emphasise the human cost of inhumane and populist government immigration and border‐entry polices underpinned by ideologies of retribution, suspicion, and demonisation. It is a moving and engaging narrative: a book that exposes state prejudice and abuse, whilst advocating for the victims who undertake perilous journeys in search of safety from lives of violence and persecution. Moreover, it is a book that pushes ideological boundaries and seeks new criminological horizons, for which the authors must be sincerely congratulated. It is a text of innovation, inspired thinking and long lasting criminological value.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this practice-led research project I work to show how a re-reading and a particular form of listening to the sound-riddled nature of Gertrude Stein's work, Two: Gertrude Stein and her Brother, presents us with a contemporary theory of sound in language. This theory, though in its infancy, is a particular enjambment of sounded language that presents itself as an event, engaged with meaning, with its own inherent voice. It displays a propensity through engagement with the 'other' to erupt into love. In this thesis these qualities are reverberated further through the work of Seth Kim-Cohen's notion of the non-cochlear, Simon Jarvis's notion of musical thinking, Jean-Jacques Lecercle's notion of délire or nonsense, Luce Irigaray's notion of jouissant love and the Bracha Ettinger's notion of the generative matrixial border space. This reading then is simultaneously paired with my own work of scoring and creating a digital opera from Stein's work, thereby testing and performing Stein's theory. In this I show how a re-reading and relistening to Stein's work can be significant to feminist ethical language frames, contemporary philosophy, sonic art theory and digital language frames. Further significance of this study is that when the reverberation of Stein's engagements with language through sound can be listened to, a pattern emerges, one that encouragingly problematizes subjectivity and interweaves genres/methods and means, creating a new frame for sound in language, one with its own voice that I call soundage.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We have tested a methodology for the elimination of the selectable marker gene after Agrobacterium-mediated transformation of barley. This involves segregation of the selectable marker gene away from the gene of interest following co-transformation using a plasmid carrying two T-DNAs, which were located adjacent to each other with no intervening region. A standard binary transformation vector was modified by insertion of a small section composed of an additional left and right T-DNA border, so that the selectable marker gene and the site for insertion of the gene of interest (GOI) were each flanked by a left and right border. Using this vector three different GOIs were transformed into barley. Analysis of transgene inheritance was facilitated by a novel and rapid assay utilizing PCR amplification from macerated leaf tissue. Co-insertion was observed in two thirds of transformants, and among these approximately one quarter had transgene inserts which segregated in the next generation to yield selectable marker-free transgenic plants. Insertion of non-T-DNA plasmid sequences was observed in only one of fourteen SMF lines tested. This technique thus provides a workable system for generating transgenic barley free from selectable marker genes, thereby obviating public concerns regarding proliferation of these genes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis has created a space for women in the history of the decolonisation of the Gilbert Islands. It traces the historical development of the national women's interests program in the Republic of Kiribati (formerly of the Gilbert and Ellice Islands Colony (GEIC)) as it was implemented through a network of women's clubs during the 1960s and 1970s. This thesis has provided the first history and interpretation of the Indigenous women's interests movement as it impacted the Gilbert Islands. It offers a narrative of the movement in terms of three overlapping waves of women leaders, based on an analysis of fieldwork, archival research and interviews conducted on South Tarawa, Kiribati.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND Malaria remains a public health problem in the remote and poor area of Yunnan Province, China. Yunnan faces an increasing risk of imported malaria infections from Mekong river neighboring countries. This study aimed to identify the high risk area of malaria transmission in Yunnan Province, and to estimate the effects of climatic variability on the transmission of Plasmodium vivax and Plasmodium falciparum in the identified area. METHODS We identified spatial clusters of malaria cases using spatial cluster analysis at a county level in Yunnan Province, 2005-2010, and estimated the weekly effects of climatic factors on P. vivax and P. falciparum based on a dataset of daily malaria cases and climatic variables. A distributed lag nonlinear model was used to estimate the impact of temperature, relative humidity and rainfall up to 10-week lags on both types of malaria parasite after adjusting for seasonal and long-term effects. RESULTS The primary cluster area was identified along the China-Myanmar border in western Yunnan. A 1°C increase in minimum temperature was associated with a lag 4 to 9 weeks relative risk (RR), with the highest effect at lag 7 weeks for P. vivax (RR = 1.03; 95% CI, 1.01, 1.05) and 6 weeks for P. falciparum (RR = 1.07; 95% CI, 1.04, 1.11); a 10-mm increment in rainfall was associated with RRs of lags 2-4 weeks and 9-10 weeks, with the highest effect at 3 weeks for both P. vivax (RR = 1.03; 95% CI, 1.01, 1.04) and P. falciparum (RR = 1.04; 95% CI, 1.01, 1.06); and the RRs with a 10% rise in relative humidity were significant from lag 3 to 8 weeks with the highest RR of 1.24 (95% CI, 1.10, 1.41) for P. vivax at 5-week lag. CONCLUSIONS Our findings suggest that the China-Myanmar border is a high risk area for malaria transmission. Climatic factors appeared to be among major determinants of malaria transmission in this area. The estimated lag effects for the association between temperature and malaria are consistent with the life cycles of both mosquito vector and malaria parasite. These findings will be useful for malaria surveillance-response systems in the Mekong river region.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We developed a reproducible model of deep dermal partial thickness burn injury in juvenile Large White pigs. The contact burn is created using water at 92 degrees C for 15s in a bottle with the bottom replaced with plastic wrap. The depth of injury was determined by a histopathologist who examined tissue sections 2 and 6 days after injury in a blinded manner. Upon creation, the circular wound area developed white eschar and a hyperaemic zone around the wound border. Animals were kept for 6 weeks or 99 days to examine the wound healing process. The wounds took between 3 and 5 weeks for complete re-epithelialisation. Most wounds developed contracted, purple, hypertrophic scars. On measurement, the thickness of the burned skin was approximately 1.8 times that of the control skin at week 6 and approximately 2.2 times thicker than control skin at 99 days after injury. We have developed various methods to assess healing wounds, including digital photographic analysis, depth of organising granulation tissue, immunohistochemistry, electron microscopy and tensiometry. Immunohistochemistry and electron microscopy showed that our porcine hypertrophic scar appears similar to human hypertrophic scarring. The development of this model allows us to test and compare different treatments on burn wounds.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Malaria has been a heavy social and health burden in the remote and poor areas in southern China. Analyses of malaria epidemic patterns can uncover important features of malaria transmission. This study identified spatial clusters, seasonal patterns, and geographic variations of malaria deaths at a county level in Yunnan, China, during 1991–2010. A discrete Poisson model was used to identify purely spatial clusters of malaria deaths. Logistic regression analysis was performed to detect changes in geographic patterns. The results show that malaria mortality had declined in Yunnan over the study period and the most likely spatial clusters (relative risk [RR] = 23.03–32.06, P < 0.001) of malaria deaths were identified in western Yunnan along the China–Myanmar border. The highest risk of malaria deaths occurred in autumn (RR = 58.91, P < 0.001) and summer (RR = 31.91, P < 0.001). The results suggested that the geographic distribution of malaria deaths was significantly changed with longitude, which indicated there was decreased mortality of malaria in eastern areas over the last two decades, although there was no significant change in latitude during the same period. Public health interventions should target populations in western Yunnan along border areas, especially focusing on floating populations crossing international borders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The notion of sovereignty is central to any international tax issue. While a nation is free to design its tax laws as it sees fit and raise revenue in accordance with the needs of its citizens, it is not possible to undertake such a task in isolation. In a world of cross-border investments and business transactions, all tax regimes impact on one another. Tax interactions between sovereign states cannot be avoided. Ultimately, the interactions mean that a nation must decide whether to engage in both collaboration and coordination with other nations and supranational bodies alike or maintain an individualised stance in relation to its tax policy. Whatever the decision, there is arguably an exercise in national sovereignty in some form. In the context of an international tax regime, whether that regime is interpreted broadly as meaning international norms generally adopted by nations around the world or domestic regimes legislating for cross-border transactions, rhetoric around national fiscal sovereignty takes on many different forms. At one end of the spectrum it is relied upon by financial secrecy jurisdictions (tax havens) as a defence to their position on the basis that ‘other’ nations cannot interfere with the fiscal sovereignty of a jurisdiction. At the other end of the spectrum, it is argued that profit shifting and international tax avoidance if not stopped is, in and of itself, a threat to a nation’s fiscal sovereignty on the basis that it threatens the ability to tax and raise the revenue needed. This paper considers a modern conceptualisation of sovereignty along with its role within international tax coordination and collaboration to argue that a move towards a more unified approach to addressing international base erosion and profit shifting may be the ultimate exercise of national fiscal sovereignty. By using the current transfer pricing regime as a case study, this paper posits that it is not merely enough to have international agreement on allocation rules to be applied, but that the ultimate exercise of national sovereignty is political agreement with other states to ensure that it is governments which determine the allocational basis of worldwide profits to be taxed. In doing so, it is demonstrated that the arm’s length pricing requirement of the current transfer pricing regime, rather than providing governments with the ability to determine the location of profits, is providing multinational entities with the ultimate power to determine that location. If left unchecked, this will eventually erode a nation’s ability to capture the required tax revenue and, as a consequence, may be deemed a failure by nation states to exercise their fiscal sovereignty.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2006, the American Law Institute (ALI) and the International Insolvency Institute (III) established a Transnational Insolvency Project and appointed Professor Ian Fletcher (United Kingdom) and Professor Bob Wessels (Netherlands) as Joint Reporters. The objective was to investigate whether the essential provisions of the ALI Principles of Cooperation among the NAFTA Countries (ALI-NAFTA Principles) and the annexed Guidelines Applicable to Court-to-Court Communication in Cross-border Cases (ALI-NAFTA Guidelines) may, with certain necessary modifications, be acceptable for use by jurisdictions across the world. In 2012, Professor Fletcher and Professor Wessels presented the report Transnational Insolvency: Global Principles for Cooperation in International Insolvency Cases (“ALI-III Report”) to the Annual Meetings of the American Law Institute and the International Insolvency Institute. In 2013, the Australian Academy of Law (AAL) provided support to the authors to undertake research on the possible benefits for Australia of courts and insolvency administrators of referring to the ALI-III Report when addressing international insolvency cases. This AAL project was at the request of the Council of Chief Justices of Australia and New Zealand. This research Report compares the Global Principles for Cooperation in International Insolvency Cases with the Cross-border Insolvency Act 2008 and the UNCITRAL Model Law as it has been adopted and has force of law in Australia. Further, it examines the Global Guidelines for Court-to-Court Communications in International Insolvency Cases in light of Australian cross-border insolvency and procedural law. Finally, it makes brief reference to and commentary on the Global Rules on Conflict–of-Laws Matters in International Insolvency Cases annexed to the ALI-III Report from the perspective of Australian choice of law rules.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)