995 resultados para Security constraints


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report provides a benchmark of progress in regional planning for natural resource management in Queensland and the tropical savannas region of northern Australia during 2004. It is based on a review of regional plans and planning processes against a set of pre-defined criteria designed specifically to evaluate regional planning arrangements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evidence suggests that women who are mothers of young children have lower levels of physical activity than women of similar age who do not have children (Brown, Lee, Mishra, & Bauman, 2000). The purposes of this study were to explore the factors that constrain mothers of young children from being more physically active, and the relationship between physical activity and levels of social support available to the women. The empirical basis for this examination was provided through a study of activity levels and barriers to physical activity experienced by a sample of 543 mothers of young children from differing socioeconomic backgrounds. The data indicate that: (a) more than two-thirds of the mothers were inadequately active in their leisure time for health benefit; (b) while the vast majority of mothers expressed a desire to be more active, they were inhibited in their ability to act out their leisure preferences by a combination of structural (e.g., lack of time, money, energy) and ideological influences (e.g., sense of commitment to others); (c) access to social support (from partners, family, and friends) was seen to place some women in a better position than others to negotiate constraints that inhibit leisure participation; and (d) within groups of varying socioeconomic status (SES) there was wide variation in the amount of time spent each week in active leisure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we consider whether the behaviour of the neural circuitry that controls lower limb movements in humans is shaped primarily by the spatiotemporal characteristics of bipedal gait patterns, or by selective pressures that are sensitive to considerations of balance and energetics. During the course of normal locomotion, the full dynamics of the neural circuitry are masked by the inertial properties of the limbs. In the present study, participants executed bipedal movements in conditions in which their feet were either unloaded or subject to additional inertial loads. Two patterns of rhythmic coordination were examined. In the in-phase mode, participants were required to flex their ankles and extend their ankles in synchrony. In the out-of-phase mode, the participants flexed one ankle while extending the other and vice versa. The frequency of movement was increased systematically throughout each experimental trial. All participants were able to maintain both the in-phase and the out-of-phase mode of coordination, to the point at which they could no longer increase their frequency of movement. Transitions between the two modes were not observed, and the stability of the out-of-phase and in-phase modes of coordination was equivalent at all movement frequencies. These findings indicate that, in humans, the behaviour of the neural circuitry underlying coordinated movements of the lower limbs is not constrained strongly by the spatiotemporal symmetries of bipedal gait patterns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The summit meeting between the two Korean heads of state, which took place in Pyongyang in June 2000, constitutes a major turning point in the peninsula's history. As the effects of the meeting are gradually unfolding, a period of detente no longer seems impossible. But major difficulties remain unsolved and Korea will continue to be one of the world's most volatile areas. The task of this essay is to identify and analyse some of the entrenched political patterns that will challenge policy-makers in the years ahead. To do so it is necessary to portray the conflict in Korea not only in conventional ideological and geopolitical terms, but also, and primarily, as a question of identity. From such a vantage-point two components are essential in the search for a more peaceful peninsula. Substantial progress has recently been made in the first realm, the need to approach security problems, no matter how volatile they seem. in a cooperative and dialogical, rather than merely a coercive manner. The second less accepted but perhaps more important factor, revolves around the necessity to recognize that dialogue has its limits, that the party on the other side of the DMZ cannot always be accommodated or subsumed into compromise. Needed is an ethics of difference: a willingness to accept that the other's sense of identity and politics may be inherently incompatible with one's own.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reviews the book 'Asia Pacific Security Outlook 2000,' edited by Richard W. Baker and Charles M. Morrison.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Applied econometricians often fail to impose economic regularity constraints in the exact form economic theory prescribes. We show how the Singular Value Decomposition (SVD) Theorem and Markov Chain Monte Carlo (MCMC) methods can be used to rigorously impose time- and firm-varying equality and inequality constraints. To illustrate the technique we estimate a system of translog input demand functions subject to all the constraints implied by economic theory, including observation-varying symmetry and concavity constraints. Results are presented in the form of characteristics of the estimated posterior distributions of functions of the parameters. Copyright (C) 2001 John Wiley Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.