836 resultados para Invironmental security


Relevância:

60.00% 60.00%

Publicador:

Resumo:

El presente trabajo de investigación tiene como objetivo estudiar el papel del Derecho Internacional Público frente a la problemática actual de los Refugiados Ambientales, una nueva categoría de desplazamiento que se ha convertido en un tema latente dentro de la Comunidad Internacional. Así, el Estado del Arte será el tipo de investigación utilizado para realizar una revisión bibliográfica frente al tema y de esta manera demostrar la necesidad de realizar la inserción del concepto de Refugiado Ambiental dentro del sistema de protección internacional para el refugiado, representado en la Convención sobre el Estatuto de los Refugiados de 1951, el cual fue el primer instrumento de protección correspondiente a este tema. Por tanto se evaluarán casos emblemáticos a nivel mundial donde se demuestra cada una de las incidencias y consecuencias producidas y la desventaja que tiene el refugiado ambiental frente al refugiado convencional, y de esta manera recalcar el “vacío jurídico” dentro de este sistema de protección, al no reconocer aquellos individuos afectados por los desastres naturales y el cambio climático. Aunque es una recopilación de autores y artículos importantes frente al tema, este trabajo de investigación quiere generar un cuestionamiento a los actores responsables, a aquellos que puedan tanto sugerir como ejecutar soluciones a largo plazo que suministren la protección legal a aquellas personas que han sido forzadas a desplazarse de su lugar de origen a causa de daños ambientales y por la incapacidad gubernamental para proporcionar soluciones de prevención, mitigación y solución a este tipo de problemas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Power system real time security assessment is one of the fundamental modules of the electricity markets. Typically, when a contingency occurs, it is required that security assessment and enhancement module shall be ready for action within about 20 minutes’ time to meet the real time requirement. The recent California black out again highlighted the importance of system security. This paper proposed an approach for power system security assessment and enhancement based on the information provided from the pre-defined system parameter space. The proposed scheme opens up an efficient way for real time security assessment and enhancement in a competitive electricity market for single contingency case

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia is an increasingly important ally for the United States. It is willing to be part of challenging global missions, and its strong economy and growing self-confi dence suggest a more prominent role in both global and regional affairs. Moreover, its government has worked hard to strengthen the link between Canberra and Washington. Political and strategic affi nities between the two countries have been refl ected in--and complemented by--practiced military interoperability, as the two allies have sustained a pattern of security cooperation in relation to East Timor, Afghanistan and Iraq in the last 4 years. This growing collaboration between the two countries suggests that a reinvention of the traditional bilateral security relationship is taking place. At the core of this process lies an agreement about the need for engaging in more proactive strategic behavior in the changing global security environment, and a mutual acceptance of looming military and technological interdependence. But this new alliance relationship is already testing the boundaries of bipartisan support for security policy within Australia. Issues of strategic doctrine, defense planning, and procurement are becoming topics of fi erce policy debate. Such discussion is likely to be sharpened in the years ahead as Australia’s security relationship with the United States settles into a new framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unauthorized accesses to digital contents are serious threats to international security and informatics. We propose an offline oblivious data distribution framework that preserves the sender's security and the receiver's privacy using tamper-proof smart cards. This framework provides persistent content protections from digital piracy and promises private content consumption.

Relevância:

20.00% 20.00%

Publicador: