963 resultados para Balls (Parties)
Resumo:
The concession agreement is the core feature of BOT projects, with the concession period being the most essential feature in determining the time span of the various rights, obligations and responsibilities of the government and concessionaire. Concession period design is therefore crucial for financial viability and determining the benefit/cost allocation between the host government and the concessionaire. However, while the concession period and project life span are essentially interdependent, most methods to date consider their determination as contiguous events that are determined exogenously. Moreover, these methods seldom consider the, often uncertain, social benefits and costs involved that are critical in defining, pricing and distributing benefits and costs between the various parties and evaluating potentially distributable cash flows. In this paper, we present the results of the first stage of a research project aimed at determining the optimal build-operate-transfer (BOT) project life span and concession period endogenously and interdependently by maximizing the combined benefits of stakeholders. Based on the estimation of the economic and social development involved, a negotiation space of the concession period interval is obtained, with its lower boundary creating the desired financial return for the private investors and its upper boundary ensuring the economic feasibility of the host government as well as the maximized welfare within the project life. The outcome of the new quantitative model is considered as a suitable basis for future field trials prior to implementation. The structure and details of the model are provided in the paper with Hong Kong tunnel project as a case study to demonstrate its detailed application. The basic contributions of the paper to the theory of construction procurement are that the project life span and concession period are determined jointly and the social benefits taken into account in the examination of project financial benefits. In practical terms, the model goes beyond the current practice of linear-process thinking and should enable engineering consultants to provide project information more rationally and accurately to BOT project bidders and increase the government's prospects of successfully entering into a contract with a concessionaire. This is expected to generate more negotiation space for the government and concessionaire in determining the major socioeconomic features of individual BOT contracts when negotiating the concession period. As a result, the use of the model should increase the total benefit to both parties.
Resumo:
Directors and Officers Liability Insurance (“D&O insurance”) has grown and evolved rapidly over the past 80 years to assume an important position in most corporations’ corporate governance and risk management strategies. This article focuses upon certain topical matters of particular concern to directors and officers including the availability of defence costs where a D&O policy is subject to a statutory charge; the commercial desirability of stand-alone “A-side” coverage, being the cover provided directly to directors and officers for loss resulting from claims made against them for wrongful acts; the impact of fraud and/or dishonesty upon D&O cover; and disclosure of the nature and extent of D&O cover to the directors and officers themselves and to third parties – in the latter case such access frequently being necessary to determine the economic viability of pursuing a proposed action against a company and its directors and officers.
Resumo:
‘A Stunning Experience’ pits Oprah Winfrey and David Letterman against each other in an infinite interview. Through simple editing and compositing, both parties are rendered mute, positioned at either edge of a black void. The interviewer/interviewee dynamic is playfully reconfigured into an awkward exchange comprised entirely of blinks, breaths and head-nods. Accompanied by the sound of a curious and whispering studio audience, this wordless clash between the two talk show titans becomes emblematic of their infamous sixteen-year feud. The quasi-staring contest upends the cult of personality surrounding these iconic television hosts, while also creating and proposing a space for reflection upon the experiential and even meditative potential of watching television.
Tribological properties of γ-Y2Si2O7 ceramic against AISI 52100 steel and Si3N4 ceramic counterparts
Resumo:
Reciprocating ball-on-flat dry sliding friction and wear experiments have been conducted on singlephase γ-Y2Si2O7 ceramic flats in contact with AISI 52100 bearing steel and Si3N4 ceramic balls at 5-15N normal loads in an ambient environment. The kinetic friction coefficients of γ-Y2Si2O7 varied in the range over 0.53-0.63 against AISI 52100 steel and between 0.51-0.56 against Si3N4 ceramic. We found thatwear occurred predominantly during the running-in period and it almost ceased at the steady friction stage. The wear rates of γ-Y2Si2O7 were in the order of 10-4mm3/(N m). Besides, wear debris strongly influenced the friction and wear processes. The strong chemical affinity between γ-Y2Si2O7 and AISI 52100 balls led to a thick transfer layer formed on both contact surfaces of the flat and counterpart ball, which changed the direct sliding between the ball and the flat into a shearing within the transfer layer. For the γ-Y2Si2O7/Si3N4 pair, a thin silica hydrate lubricant tribofilm presented above the compressed debris entrapped in the worn track and contact ball surface. This transfer layer and the tribofilm separated the sliding couple from direct contact and contributed to the low friction coefficient and wear rate.
Resumo:
FRDC project 2008/306 Building economic capability to improve the management of marine resources in Australia was developed and approved in response to the widespread recognition and acknowledgement of the importance of incorporating economic considerations into marine management in Australia and of the persistent undersupply of suitably trained and qualified individuals capable of providing this input. The need to address this shortfall received broad based support and following widespread stakeholder consultation and building on previous unsuccessful State-based initiatives, a collaborative, cross-jurisdictional cross-institutional capability building model was developed. The resulting project sits within the People Development Program as part of FRDC’s ‘investment in RD&E to develop the capabilities of the people to whom the industry entrusts its future’, and has addressed its objectives largely through three core activities: 1. The Fisheries Economics Graduate Research Training Program which provides research training in fisheries/marine economics through enrolment in postgraduate higher degree studies at the three participating Universities; 2. The Fisheries Economics Professional Training Program which aims to improve the economic literacy of non-economist marine sector stakeholders and was implemented in collaboration with the Seafood Cooperative Research Centre through the Future Harvest Masterclass in Fisheries Economics; and, 3. The Australian Fisheries Economics Network (FishEcon) which aims to strengthen research in the area of fisheries economics by creating a forum in which fisheries economists, fisheries managers and Ph.D. students can share research ideas and results, as well as news of upcoming research opportunities and events. These activities were undertaken by a core Project team, comprising economic researchers and teachers from each of the four participating institutions (namely the University of Tasmania, the University of Adelaide, Queensland University of Technology and the Commonwealth Scientific and Industrial Research Organisation), spanning three States and the Commonwealth. The Project team reported to and was guided by a project Steering Committee. Commensurate with the long term nature of the project objectives and some of its activities the project was extended (without additional resources) in 2012 to 30th June 2015.
Resumo:
The 17th Biennial Conference of the International Institute of Fisheries Economics and Trade (IIFET) was held in Brisbane in July 2014. IIFET is the principal international association for fisheries economics, and the biennial conference is an opportunity for the best fisheries economists in the world to meet and share their ideas. The conference was organised by CSIRO, QUT, UTAS, University of Adelaide and KG Kailis Ltd. This is the first time the conference has been held in Australia. The conferences covered a wide range of topics of relevance to Australia. These included studies of fishery management systems around the world, identified key issues in aquaculture and marine biodiversity conservation, and provided a forum for new modelling and theoretical approaches to analysing fisheries problems to be presented. The theme of the conference was Towards Ecosystem Based Management of Fisheries: What Role can Economics Play? Several sessions were dedicated to modelling socio-ecological systems, and two keynote speakers were invited to present the latest thinking in the area. In this report, the key features of the conference are outlined.
Resumo:
Amongst social players, the prank, as a social performance form, holds a lot of potential to impact on personal, relational and social status within a group or between one group and another group. More than simply showing off, a prank in the strictest definition of the term, is a social performance in which one player, a prankster, deploys mischief, trickery or deceit, to cause a moment of anxiety, fear or anger about a happening for another spectator-become-collaborating-player, a prankee – to enhance social bonds, entertain, or comment on a social, cultural or political phenomenon. During a prank, the prankster’s ability to be creative, clever or culturally astute, and the prankee’s ability to be duped, be a good sport, play along, or even play/pay the prankster back, both become fodder for other spectators and society to scrutinize. In Australia, pranking traditions are popular with many social groups, from the community-building pranks of footballers, bucks parties and ‘drop bear’ tales told to tourists, to the more controversial pranks of radio shock jocks, activists and artists. In this paper, I consider whether theatrical terms – theoretical terms from the stage such as actor, acting, objective, arc, performance, audience and emotion, such as those offered by Joseph Roach – are useful in understanding the passion some social players show for pranksterism. Are theatrical terms such as Roach’s as useful as analysts of social self-performance such as Erving Goffman suggest they are? Do they assist in understanding the personal actions, reactions and emotions of prankster and prankee? Do they assist in understanding the power relations between prankster and prankee? Do they assist in understanding the relation between the prank – be it an everyday prank amongst families, friends and coworkers, an entertainment program prank of the sort seen on Prank Patrol, Punked or Scare Tactics, or an activist pranks perpetrated by a guerrilla artist, ‘jammers’ or ‘hackers’ intent on turning dominant social systems back on themselves – the social players, and the public sphere in which the prank takes place? I reflect on how reading pranks as performances, by players, for highly participatory audiences, helps understand why they are so prevalent, and so recurrent across times, cultures and contexts, and also so controversial when not performed well enough – or when performed too well – prompting outrage from the prankster, prankee or society as passionate as any debate about a performance by players in a theatre.
Resumo:
The Body Area Network (BAN) is an emerging technology that focuses on monitoring physiological data in, on and around the human body. BAN technology permits wearable and implanted sensors to collect vital data about the human body and transmit it to other nodes via low-energy communication. In this paper, we investigate interactions in terms of data flows between parties involved in BANs under four different scenarios targeting outdoor and indoor medical environments: hospital, home, emergency and open areas. Based on these scenarios, we identify data flow requirements between BAN elements such as sensors and control units (CUs) and parties involved in BANs such as the patient, doctors, nurses and relatives. Identified requirements are used to generate BAN data flow models. Petri Nets (PNs) are used as the formal modelling language. We check the validity of the models and compare them with the existing related work. Finally, using the models, we identify communication and security requirements based on the most common active and passive attack scenarios.
Resumo:
The collaboration between universities and industries has become increasingly important for the development of Science and Technology. This is particularly more prominent in the Science Technology Engineering and Mathematics (STEM) disciplines. Literature suggest that the key element of University-Industry Partnership (UIP) is the exchange of knowledge that is mutually beneficial for both parties. One real example of the collaborations is Industry-Based Learning (IBL) in which university students are coming into industries to experience and learn how the skills and knowledge acquired in the classroom are implemented in work places. This paper investigate how the University-Industry Collaboration program is implemented though Industry-Based Learning (IBL) at Indonesian Universities. The research findings offer useful insights and create a new knowledge in the field of STEM education and collaborative learning. The research will contribute to existing knowledge by providing empirical understanding of this topic. The outcomes can be used to improve the quality of University-Industry Partnership programs at Indonesian Universities and inform Indonesian higher education authorities and their industrial partners of an alternative approach to enhance their IBL programs.
Resumo:
Bees are well known for being industrious pollinators. Some species, however, have taken to invading the nests of other colonies to steal food, nest material or the nest site itself. Despite the potential mortality costs due to fighting with an aggressive opponent, the prospects of a large bounty can be worth the risk. In this review, we aim to bring together current knowledge on intercolony fighting with a view to better understand the evolution of warfare in bees and identify avenues for future research. A review of literature reveals that at least 60 species of stingless bees are involved in heterospecific conflicts, either as attacking or victim colonies. The threat of invasion has led to the evolution of architectural, behavioural and morphological adaptations, such as narrow entrance tunnels, mud balls to block the entrance, decoy nests that direct invaders away from the brood chamber, fighting swarms, and soldiers that are skilled at immobilising attackers. Little is known about how victim colonies are selected, but a phylogenetically controlled analysis suggests that the notorious robber bee Lestrimelitta preferentially attacks colonies of species with more concentrated honey. Warfare among bees poses many interesting questions, including why species differ so greatly in their response to attacks and how these alternative strategies of obtaining food or new nest sites have evolved.
Resumo:
In this research I ask what is interpreted as sex-based harassment by 15-16-year old girls and boys. By sex-based harassment I refer to one-sided, unwanted attention that is based on gender and that makes the target feel embarrassed, frightened, hurt or angry. My focus is not on the most overt cases of harassment but rather on everyday encounters. While young people differentiate between harassing and non-harassing attention, at the same time they define, assign value to and construct differences and power relations on the basis of gender, age and ethnicity, for example. My main data consists of essays (N 104, 54 girls, 54 boys) and thematic interviews (N 14; 20 girls, 3 boys) of ninth graders of a secondary school in Helsinki. In the essays and interviews, students construe the border between pleasant and unpleasant, tolerable and intolerable attention as clear in principle, but, they suggest that in practice this border is ambivalent, negotiable and contextual. The interpretations of incidents are justified by referring to features of the target, the scene or the perpetrator. Targets of harassment are most often construed as being girls who are characterized as thin-skinned, but at the same time they are expected to be understanding toward any sex-based attention they may get, particularly when it is not physical. On the other hand, girls are regarded as equal and even active participants in incidents of harassment. Such statements include considerations of how girls either reject or invite particular kinds of attention by their actions and outward appearance. Forms of harassment, ways of understanding it as well as overcoming it vary according to spatial context. By situating incidents in different spaces and places, young people contrast their experiences with ordinary and predictable non-harassment that takes place e.g. in discos and unusual and unexpected harassment that takes place e.g. in the city streets in the daytime. The behaviour of boys harassing a girls is naturalized by appealing to young masculinity and the childishness but also strong sexual drive which is seen as characteristic of teenage boys. On the other hand, sex-based harassment is racialized and pathologized in ways that separate the phenomenon from young, Finnish, normal masculinity. Both the material experiences of the young people and the definitions of the parties involved in harassing incidents are gendered. Girls encounter and deal with sexualized commenting and unwanted approaches much more often and in a more intensive way than boys. Furthermore, there is a vast cultural repertoire of acceptable accounts that can be mobilised in order to excuse male harassers, to critically evaluate the appearance or action of the female targets and to divide the responsibility between the female target and the male perpetrator.
Resumo:
"Contesting Forests and Power; Dispute, Violence and Negotiations in Central Java" is an ethnographic analysis of an ongoing forest land dispute and its negotiations in an upland forest village in the district of Wonosobo, Central Java. Rather than focusing only on the village site, this ethnography of global connections explores the inequalities of power in different negotiation arenas and how these power relations have had an effect on the dispute and efforts made to settle it. Today, national and transnational connections have an effect on how land disputes develop. This study argues that different cosmological and cultural orientations influence how the dispute and its negotiations have evolved. It draws its theoretical framework from legal and political anthropology by looking at the position of law in society, exploring state formation processes and issues of power. The dispute over state forest land is about a struggle over sovereignty which involves violence on the parts of different parties who maintain that they have a legitimate right to the state forest land. This anthropological study argues that this dispute and its negotiations reflect the plurality of laws in Java and Indonesia in a complex way. It shows that this dispute over forests and land in Java has deep historical roots that were revealed as the conflict emerged. Understanding land disputes in Java is important because of the enormous potential for conflicts over land and other natural resources throughout Indonesia. After the fall of President Suharto in 1998, disputes over access to state forest land emerged as a problem all over upland Java. As the New Order came to an end, forest cover on state forest lands in the Wonosobo district was largely destroyed. Disputes over access to land and forests took another turn after the decentralization effort in 1999, suggesting that decentralization does not necessarily contribute to the protection of forests. The dispute examined here is not unique, but, rather, this study attempts to shed light on forest-related conflicts all around upland Indonesia and on the ways in which differential power relations are reflected in these conflicts and the negotiation processes meant to resolve them.
Resumo:
In recent decades, nation-states have become major stakeholders in nonhuman genetic resource networks as a result of several international treaties. The most important of these is the juridically binding international Convention on Biological Diversity (CBD), signed at the Rio Earth Summit in 1992 by some 150 nations. This convention was a watershed for the identification of global rights related to genetic resources in recognising the sovereign power of signatory nations over their natural resources. The contracting parties are legally obliged to identify their native genetic material and to take legislative, administrative, and/or policy measures to foster research on genetic resources. In this process of global bioprospecting in the name of biodiversity conservation, the world's nonhuman genetic material is to be indexed according to nation and nationality. This globally legitimated process of native genetic identification inscribes national identity into nature and flesh. As a consequence, this new form of potential national biowealth forms also what could be called novel nonhuman genetic nationhoods. These national corporealities are produced in tactical and strategic encounters of the political and the scientific, in new spaces crafted through technical and institutional innovation, and between the national reconfiguration of the natural and cultural as framed by international political agreements. This work follows the creation of national genetic resources in one of the biodiversity-poor countries of the North, Finland. The thesis is an ethnographic work addressing the calculation of life: practices of identifying, evaluating, and collecting nonhuman life in national genetic programmes. The core of the thesis is about observations made within the Finnish Genetic Resources Programmes in 2004 2008, gathered via multi-sited ethnography and related methods derived from the anthropology of science. The thesis explores the problematic relations of the communal forms of human and nonhuman life in an increasingly technoscientific contemporaneity the co-production and coexistence of human and nonhuman life in biopolitical formations called nations.
Resumo:
This thesis proposes that national or ethnic identity is an important and overlooked resource in conflict resolution. Usually ethnic identity is seen both in international relations and in social psychology as something that fuels the conflict. Using grounded theory to analyze data from interactive problem-solving workshops between Palestinians and Israelis a theory about the role of national identity in turning conflict into protracted conflict is developed. Drawing upon research from, among others, social identity theory, just world theory and prejudice it is argued that national identity is a prime candidate to provide the justification of a conflict party’s goals and the dehumanization of the other necessary to make a conflict protracted. It is not the nature of national identity itself that lets it perform this role but rather the ability to mobilize a constituency for social action (see Stürmer, Simon, Loewy, & Jörger, 2003). Reicher & Hopkins (1996) have demonstrated that national identity is constructed by political entrepreneurs to further their cause, even if this construction is not a conscious one. Data from interactive problem-solving workshops suggest that the possibility of conflict resolution is actually seen by participants as a direct threat of annihilation. Understanding the investment necessary to make conflict protracted this reaction seems plausible. The justification for ones actions provided by national identity makes the conflict an integral part of a conflict party’s identity. Conflict resolution, it is argued, is therefore a threat to the very core of the current national identity. This may explain why so many peace agreements have failed to provide the hoped for resolution of conflict. But if national identity is being used in a constructionist way to attain political goals, a political project of conflict resolution, if it is conscious of the constructionist process, needs to develop a national identity that is independent of conflict and therefore able to accommodate conflict resolution. From this understanding it becomes clear why national identity needs to change, i.e. be disarmed, if conflict resolution is to be successful. This process of disarmament is theorized to be similar to the process of creating and sustaining protracted conflict. What shape and function this change should have is explored from the understanding of the role of national identity in supporting conflict. Ideas how track-two diplomacy efforts, such as the interactive problem-solving workshop, could integrate a process by both conflict parties to disarm their respective identities are developed.
Resumo:
"Trust and Collectives" is a compilation of articles: (I) "On Rational Trust" (in Meggle, G. (ed.) Social Facts & Collective Intentionality, Dr. Hänsel-Hohenhausen AG (currently Ontos), 2002), (II) "Simulating Rational Social Normative Trust, Predictive Trust, and Predictive Reliance Between Agents" (M.Tuomela and S. Hofmann, Ethics and Information Technology 5, 2003), (III) "A Collective's Trust in a Collective's action" (Protosociology, 18-19, 2003), and (IV) "Cooperation and Trust in Group Contexts" (R. Tuomela and M.Tuomela, Mind and Society 4/1, 2005 ). The articles are tied together by an introduction that dwells deeply on the topic of trust. (I) presents a somewhat general version of (RSNTR) and some basic arguments. (II) offers an application of (RSNTR) for a computer simulation of trust.(III) applies (RSNTR) to Raimo Tuomela's "we-mode"collectives (i.e. The Philosophy of Social Practices, Cambridge University Press, 2002). (IV) analyzes cooperation and trust in the context of acting as a member of a collective. Thus, (IV) elaborates on the topic of collective agency in (III) and puts the trust account (RSNTR) to work in a framework of cooperation. The central aim of this work is to construct a well-argued conceptual and theoretical account of rational trust, viz. a person's subjectively rational trust in another person vis-à-vis his performance of an action, seen from a first-person point of view. The main method is conceptual and theoretical analysis understood along the lines of reflective equilibrium. The account of rational social normative trust (RSNTR), which is argued and defended against other views, is the result of the quest. The introduction stands on its own legs as an argued presentation of an analysis of the concept of rational trust and an analysis of trust itself (RSNTR). It is claimed that (RSNTR) is "genuine" trust and embedded in a relationship of mutual respect for the rights of the other party. This relationship is the growing site for trust, a causal and conceptual ground, but it is not taken as a reason for trusting (viz. predictive "trust"). Relevant themes such as risk, decision, rationality, control, and cooperation are discussed and the topics of the articles are briefly presented. In this work it is argued that genuine trust is to be kept apart from predictive "trust." When we trust a person vis-à-vis his future action that concerns ourselves on the basis of his personal traits and/or features of the specific situation we have a prediction-like attitude. Genuine trust develops in a relationship of mutual respect for the mutual rights of the other party. Such a relationship is formed through interaction where the parties gradually find harmony concerning "the rules of the game." The trust account stands as a contribution to philosophical research on central social notions and it could be used as a theoretical model in social psychology, economical and political science where interaction between persons and groups are in focus. The analysis could also serve as a model for a trust component in computer simulation of human action. In the context of everyday life the account clarifies the difference between predictive "trust" and genuine trust. There are no fast shortcuts to trust. Experiences of mutual respect for mutual rights cannot be had unless there is respect.