140 resultados para Fraudulent conveyance
Resumo:
Examines the basis on which damages for misrepresentation are awarded, suggesting that the underlying principles lack coherence, and calls for clarification of the law. Argues that there are valid policy considerations justifying a distinction between the basis of the award of damages for fraudulent misrepresentation and negligent misrepresentation. Explains why identification of the three stages in the process of awarding damages for misrepresentation are crucial to the application of the underlying legal principles of causation and remoteness at the right stage of the process. Reviews case law on lost opportunity damages for fraudulent misrepresentation, the application of loss of chance principles, and recovery of post-contract losses.
Resumo:
Comments on the refusal of the English courts to recognise the existence of a remedy of partial rescission, suggesting that in certain restricted instances justification exists for the grant of such a remedy. Considers the nature of the remedy of rescission under English law, the English courts' approach towards partial rescission and the nature and scope of the discretions available to the courts, noting the decisions in TSB Bank Plc v Camfield and De Molestina v Ponton. Reviews the historical origins of the remedy of rescission, including the distinction between fraudulent and non fraudulent misrepresentation and the origins of the so called concurrent and auxiliary equitable jurisdictions. Compares the approach of the Australian courts and highlights examples of recognition of partial rescission under international law.
Resumo:
The main objective of the work presented in this thesis is to investigate the two sides of the flute, the face and the heel of a twist drill. The flute face was designed to yield straight diametral lips which could be extended to eliminate the chisel edge, and consequently a single cutting edge will be obtained. Since drill rigidity and space for chip conveyance have to be a compromise a theoretical expression is deduced which enables optimum chip disposal capacity to be described in terms of drill parameters. This expression is used to describe the flute heel side. Another main objective is to study the effect on drill performance of changing the conventional drill flute. Drills were manufactured according to the new flute design. Tests were run in order to compare the performance of a conventional flute drill and non conventional design put forward. The results showed that 50% reduction in thrust force and approximately 18% reduction in torque were attained for the new design. The flank wear was measured at the outer corner and found to be less for the new design drill than for the conventional one in the majority of cases. Hole quality, roundness, size and roughness were also considered as a further aspect of drill performance. Improvement in hole quality is shown to arise under certain cutting conditions. Accordingly it might be possible to use a hole which is produced in one pass of the new drill which previously would have required a drilled and reamed hole. A subsidiary objective is to design the form milling cutter that should be employed for milling the foregoing special flute from drill blank allowing for the interference effect. A mathematical analysis in conjunction with computing technique and computers is used. To control the grinding parameter, a prototype drill grinder was designed and built upon the framework of an existing cincinnati cutter grinder. The design and build of the new grinder is based on a computer aided drill point geometry analysis. In addition to the conical grinding concept, the new grinder is also used to produce spherical point utilizing a computer aided drill point geometry analysis.
Resumo:
2000 Mathematics Subject Classification: 62H30, 62M10, 62M20, 62P20, 94A13.
Resumo:
Acoustic velocity meter (AVM) sites, located both distant and adjacent to canal water control structures, were constructed and calibrated in L-31W borrow canal and Canal 111 (C-111) to measure canal water velocity. Data were used to compute monthly discharge volumes and overall water budgets for several canal reaches from August 1994 to May 1996. The water budgets indicated extensive aquifer inflows in L-31W associated, in part, with S-332 pump station return flows. Canal and groundwater piezometer data showed 5 distinct hydrologic scenarios (distinguished by the direction and magnitude of hydraulic gradients) in the important Frog Pond area on the eastern boundary of the Everglades National Park. Most of the water lost from C-111 was via surface water losses near the outlet of the system, close to Florida Bay. The distribution of flows during the study suggest an alteration of the present South Dade Conveyance System modification plan to improve water deliveries to Taylor Slough and the Eastern Panhandle of the Everglades National Park. ^
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^
Resumo:
With hundreds of millions of users reporting locations and embracing mobile technologies, Location Based Services (LBSs) are raising new challenges. In this dissertation, we address three emerging problems in location services, where geolocation data plays a central role. First, to handle the unprecedented growth of generated geolocation data, existing location services rely on geospatial database systems. However, their inability to leverage combined geographical and textual information in analytical queries (e.g. spatial similarity joins) remains an open problem. To address this, we introduce SpsJoin, a framework for computing spatial set-similarity joins. SpsJoin handles combined similarity queries that involve textual and spatial constraints simultaneously. LBSs use this system to tackle different types of problems, such as deduplication, geolocation enhancement and record linkage. We define the spatial set-similarity join problem in a general case and propose an algorithm for its efficient computation. Our solution utilizes parallel computing with MapReduce to handle scalability issues in large geospatial databases. Second, applications that use geolocation data are seldom concerned with ensuring the privacy of participating users. To motivate participation and address privacy concerns, we propose iSafe, a privacy preserving algorithm for computing safety snapshots of co-located mobile devices as well as geosocial network users. iSafe combines geolocation data extracted from crime datasets and geosocial networks such as Yelp. In order to enhance iSafe's ability to compute safety recommendations, even when crime information is incomplete or sparse, we need to identify relationships between Yelp venues and crime indices at their locations. To achieve this, we use SpsJoin on two datasets (Yelp venues and geolocated businesses) to find venues that have not been reviewed and to further compute the crime indices of their locations. Our results show a statistically significant dependence between location crime indices and Yelp features. Third, review centered LBSs (e.g., Yelp) are increasingly becoming targets of malicious campaigns that aim to bias the public image of represented businesses. Although Yelp actively attempts to detect and filter fraudulent reviews, our experiments showed that Yelp is still vulnerable. Fraudulent LBS information also impacts the ability of iSafe to provide correct safety values. We take steps toward addressing this problem by proposing SpiDeR, an algorithm that takes advantage of the richness of information available in Yelp to detect abnormal review patterns. We propose a fake venue detection solution that applies SpsJoin on Yelp and U.S. housing datasets. We validate the proposed solutions using ground truth data extracted by our experiments and reviews filtered by Yelp.
Resumo:
A pivotal component of hydrological restoration of the Florida Everglades is the improvement of water conveyance to Everglades National Park by the degradation of the current network of canals, roadways and levees. The Tamiami Trail (L29) road/canal complex represents a major barrier to natural water flows into the park and a variety of modification options for flow improvement are currently being explored, including the installation of spreader swales immediately downstream of culverts conveying water under Tamiami Trail from the L29 canal into Everglades National Park. In this study, we evaluated water column chemistry and wet-season diatom community structure to provide baseline information for use in future monitoring activities related to the proposed Tamiami Trail modifications. Water chemistry showed pronounced fluctuations in response to precipitation and anthropogenically mediated hydrological events. Differences in water quality variables among sites were dampened during periods of inundation, and became more pronounced during periods of low canal stage, suggesting the importance of small-scale mechanisms related to isolation of habitat patches. Diatom assemblages were unexpectedly speciose (127 taxa in 40 samples) compared to typical Everglades assemblages, and spatially heterogeneous in sites associated with concentric areas of dense vegetation immediately downstream of culverts. We also observed significant compositional dissimilarities among transects, indicating that culvert pool and north transect assemblages were substantially influenced by propagule input from the canal and areas to the north, while south transect sites were compositionally similar to typical sawgrass prairie diatom communities. Central transect sites were compositionally intermediate to their north and south counterparts. We propose that the position and spatial extent of this “transitional assemblage” is a sensitive indicator of subtle environmental change related to Tamiami Trail modifications.
Resumo:
Estuarine productivity is highly dependent on the freshwater sources of the estuary. In Florida Bay, Taylor Slough was historically the main source of fresh water. Beginning in about 1960, and culminating with the completion of the South Dade Conveyance System in 1984, water management practice began to change the quantity and distribution of flow from Taylor Slough into Northeastern Florida Bay. These practices altered salinity and hydrologic parameters that had measurable negative impacts on vertebrate fauna and their habitats. Here, I review those impacts from published and unpublished literature and anecdotal observations. Almost all vertebrates covered in this review have shown some form of population decline since 1984; most of the studies implicate declines in food resources as the main stressor on their populations. My conclusion is that the diversion of fresh water resulted in an ecological cascade starting with hydrologic stresses on primary then secondary producers culminating in population declines at the top of the food web.
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.
Resumo:
In the past decade, several major food safety crises originated from problems with feed. Consequently, there is an urgent need for early detection of fraudulent adulteration and contamination in the feed chain. Strategies are presented for two specific cases, viz. adulterations of (i) soybean meal with melamine and other types of adulterants/contaminants and (ii) vegetable oils with mineral oil, transformer oil or other oils. These strategies comprise screening at the feed mill or port of entry with non-destructive spectroscopic methods (NIRS and Raman), followed by post-screening and confirmation in the laboratory with MS-based methods. The spectroscopic techniques are suitable for on-site and on-line applications. Currently they are suited to detect fraudulent adulteration at relatively high levels but not to detect low level contamination. The potential use of the strategies for non-targeted analysis is demonstrated.
Resumo:
Conventional wisdom in many agricultural systems across the world is that farmers cannot, will not, or should not pay the full costs associated with surface water delivery. Across Organisation for Economic Co-operation and Development (OECD) countries, only a handful can claim complete recovery of operation, maintenance, and capital costs; across Central and South Asia, fees are lower still, with farmers in Nepal, India, and Kazakhstan paying fractions of a U.S. penny for a cubic meter of water. In Pakistan, fees amount to roughly USD 1-2 per acre per season. However, farmers in Pakistan spend orders of magnitude more for diesel fuel to pump groundwater each season, suggesting a latent willingness to spend for water that, under the right conditions, could potentially be directed toward water-use fees for surface water supply. Although overall performance could be expected to improve with greater cost recovery, asymmetric access to water in canal irrigation systems leaves the question open as to whether those benefits would be equitably shared among all farmers in the system. We develop an agent-based model (ABM) of a small irrigation command to examine efficiency and equity outcomes across a range of different cost structures for the maintenance of the system, levels of market development, and assessed water charges. We find that, robust to a range of different cost and structural conditions, increased water charges lead to gains in both efficiency and concomitant improvements in equity as investments in canal infrastructure and system maintenance improve the conveyance of water resources further down watercourses. This suggests that, under conditions in which (1) farmers are currently spending money to pump groundwater to compensate for a failing surface water system, and (2) there is the possibility that through initial investment to provide perceptibly better water supply, genuine win-win solutions can be attained through higher water-use fees to beneficiary farmers.
Resumo:
With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognized their responsibilities to safeguard physical and information assets. Security standards can be used as guideline or framework to develop and maintain an adequate information security management system (ISMS). The standards ISO/IEC 27000, 27001 and 27002 are international standards that are receiving growing recognition and adoption. They are referred to as “common language of organizations around the world” for information security. With ISO/IEC 27001 companies can have their ISMS certified by a third-party organization and thus show their customers evidence of their security measures.
Resumo:
The large number of opinions generated by online users made the former “word of mouth” find its way to virtual world. In addition to be numerous, many of the useful reviews are mixed with a large number of fraudulent, incomplete or duplicate reviews. However, how to find the features that influence on the number of votes received by an opinion and find useful reviews? The literature on opinion mining has several studies and techniques that are able to analyze of properties found in the text of reviews. This paper presents the application of a methodology for evaluation of usefulness of opinions with the aim of identifying which characteristics have more influence on the amount of votes: basic utility (e.g. ratings about the product and/or service, date of publication), textual (e.g.size of words, paragraphs) and semantics (e.g., the meaning of the words of the text). The evaluation was performed in a database extracted from TripAdvisor with opinionsabout hotels written in Portuguese. Results show that users give more attention to recent opinions with higher scores for value and location of the hotel and with lowest scores for sleep quality and service and cleanliness. Texts with positive opinions, small words, few adjectives and adverbs increase the chances of receiving more votes.
Development of a simple and fast “DNA extraction kit” for sea food identification and marine species
Resumo:
Seafood products fraud, the misrepresentation of them, have been discovered all around the world in different forms as false labeling, species substitution, short-weighting or over glazing in order to hide the correct identity, origin or weight of the seafood products. Due to the value of seafood products such as canned tuna, swordfish or grouper, these species are the subject of the commercial fraud is mainly there placement of valuable species with other little or no value species. A similar situation occurs with the shelled shrimp or shellfish that are reduced into pieces for the commercialization. Food fraud by species substitution is an emerging risk given the increasingly global food supply chain and the potential food safety issues. Economic food fraud is committed when food is deliberately placed on the market, for financial gain deceiving consumers (Woolfe, M. & Primrose, S. 2004). As a result of the increased demand and the globalization of the seafood supply, more fish species are encountered in the market. In this scenary, it becomes essential to unequivocally identify the species. The traditional taxonomy, based primarily on identification keys of species, has shown a number of limitations in the use of the distinctive features in many animal taxa, amplified when fish, crustacean or shellfish are commercially transformed. Many fish species show a similar texture, thus the certification of fish products is particularly important when fishes have undergone procedures which affect the overall anatomical structure, such as heading, slicing or filleting (Marko et al., 2004). The absence of morphological traits, a main characteristic usually used to identify animal species, represents a challenge and molecular identification methods are required. Among them, DNA-based methods are more frequently employed for food authentication (Lockley & Bardsley, 2000). In addition to food authentication and traceability, studies of taxonomy, population and conservation genetics as well as analysis of dietary habits and prey selection, also rely on genetic analyses including the DNA barcoding technology (Arroyave & Stiassny, 2014; Galimberti et al., 2013; Mafra, Ferreira, & Oliveira, 2008; Nicolé et al., 2012; Rasmussen & Morrissey, 2008), consisting in PCR amplification and sequencing of a COI mitochondrial gene specific region. The system proposed by P. Hebert et al. (2003) locates inside the mitochondrial COI gene (cytochrome oxidase subunit I) the bioidentification system useful in taxonomic identification of species (Lo Brutto et al., 2007). The COI region, used for genetic identification - DNA barcode - is short enough to allow, with the current technology, to decode sequence (the pairs of nucleotide bases) in a single step. Despite, this region only represents a tiny fraction of the mitochondrial DNA content in each cell, the COI region has sufficient variability to distinguish the majority of species among them (Biondo et al. 2016). This technique has been already employed to address the demand of assessing the actual identity and/or provenance of marketed products, as well as to unmask mislabelling and fraudulent substitutions, difficult to detect especially in manufactured seafood (Barbuto et al., 2010; Galimberti et al., 2013; Filonzi, Chiesa, Vaghi, & Nonnis Marzano, 2010). Nowadays,the research concerns the use of genetic markers to identify not only the species and/or varieties of fish, but also to identify molecular characters able to trace the origin and to provide an effective control tool forproducers and consumers as a supply chain in agreementwith local regulations.