Academic literature on the topic 'Law not elsewhere classified'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Law not elsewhere classified.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Law not elsewhere classified"

1

Chaiyarat, Rattanawat, Namphung Youngpoy, Praeploy Kongsurakan, and Seree Nakbun. "Habitat preferences of reintroduced banteng (Bos javanicus) into the Salakphra Wildlife Sanctuary, Thailand." Wildlife Research 46, no. 7 (2019): 573. http://dx.doi.org/10.1071/wr18184.

Full text
Abstract:
Abstract ContextLarge forest-dwelling mammals are highly sensitive to habitat structure. Thus, understanding the responses of reintroduced banteng (Bos javanicus d’Alton 1823) to their habitat is important for ensuring the sustainability of a reintroduction program. AimsThe aim of the present study was to evaluate the habitat preferences of banteng after reintroduction into the Salakphra Wildlife Sanctuary in Thailand on the basis of fieldwork conducted between January 2015 and November 2017. MethodsSeven banteng individuals bred at the Khao Nampu Nature and Wildlife Education Center were systematically reintroduced into the Salakphra Wildlife Sanctuary in 2015 (four individuals) and 2016 (three individuals). The banteng individuals were tracked via radio-collars and camera-traps. The maximum-entropy method (MaxEnt) and multiple logistic regressions (MLR) were used to identify habitat preferences. Kernel-density estimates (KDE) and a minimum convex polygon (MCP) were used to estimate the area of the habitat used. Key resultsIn total, 407 radio-signal locations showed that the MaxEnt habitat-preference models classified the banteng as associated with distance from villages and salt licks (regularised training gain of >1.0). Multiple logistic regressions form 32 camera-trap locations classified the banteng as associated with low elevations far from villages, guard stations and roads in a flat area (no aspect). The two methods for estimating habitat use provided similar results and showed that the reintroduced banteng used a wider range of habitat in the dry than in the wet season. ConclusionsThe results from the present study suggest that the reintroduced banteng individuals prefer low elevations and flat areas without human activity. ImplicationsThese findings are important for possible translocations elsewhere.
APA, Harvard, Vancouver, ISO, and other styles
2

Tsiftsis, Spyros. "The role of Natura 2000 network in protecting the orchid flora of East Macedonia (NE Greece)." EUROPEAN JOURNAL OF ENVIRONMENTAL SCIENCES 11, no. 2 (December 14, 2021): 71–78. http://dx.doi.org/10.14712/23361964.2021.8.

Full text
Abstract:
East Macedonia (northeast Greece) is a relatively small part of Greece, where a considerable number of orchid taxa occurs. Some of these orchids can only be found there and this fact makes the specific area of Greece unique. In this study, an up-to date database of orchid records was used to assess the effectiveness of the existing Natura 2000 network. Specifically, the effectiveness of the Natura 2000 network was evaluated by identifying the number of orchids whose distribution is overlapping to a lesser or greater extent with the network, which chorological categories are included/excluded from it, and whether the rare and threatened orchid taxa are adequately distributed within that. Out of the 73 orchid taxa recorded in East Macedonia so far, 14 taxa are exclusively distributed outside the Natura 2000 network. Specifically, the Natura 2000 network is not overlapped with a number of Balkan and Mediterranean orchid taxa, which are only sparsely found in East Macedonia. Moreover, most of the orchid taxa that have been classified in the threat categories of the IUCN are distributed within the Natura 2000 network of East Macedonia, and specifically, some of the most threatened ones are almost exclusively distributed within that network. Consequently, although the Natura 2000 network is not congruent with the distribution of a number of species of southern origin, which are widely distributed elsewhere in Greece, it can conserve important floristic elements of Greece, which are orchid taxa of northern or central European origin.
APA, Harvard, Vancouver, ISO, and other styles
3

Soroka, Marianna, Barbara Wasowicz, and Katarzyna Zając. "Conservation status and a novel restoration of the endangered freshwater mussel Unio crassus Philipsson, 1788: Poland case." Knowledge & Management of Aquatic Ecosystems, no. 422 (2021): 3. http://dx.doi.org/10.1051/kmae/2021003.

Full text
Abstract:
Bivalves play an important part in freshwater ecosystems and improve water quality; the thick-shelled river mussel Unio crassus is classified as a bioindicator. Unfortunately, the species is regarded as endangered and is under species protection in the whole of Europe. The reasons for the drastic decline of its populations are: considerable eutrophication of waters, anthropogenic influence in its broad sense and the presence of invasive species. The life cycle of U. crassus includes the stage of larva which is an obligatory parasite of fish. This makes it possible for the species to disperse and populate new territories but it limits the development to places where appropriate host species are available. Intensive measures have been taken in Poland to protect U. crassus, while in France numerous new localities of the species have been bar-coded. In 2010–2014 active protection measures were taken in southern Poland, including inventorying, studies of genetic diversity and reintroductions. The project contributed to the increase in population abundance and in the number of localities of the thick-shelled river mussel, which resulted in a twofold increase in the range of occurrence of the species in the river. The procedures presented here can and should be used in further restitution of U. crassus not only in Poland but also elsewhere in Europe.
APA, Harvard, Vancouver, ISO, and other styles
4

Ridgway, Jessica P., Jessica Schmitt, Ellen Almirol, Monique Millington, Erika Harding, and David Pitrak. "Electronic data sharing between public health department and clinical providers improves accuracy of HIV retention data." Open Forum Infectious Diseases 4, suppl_1 (2017): S421—S422. http://dx.doi.org/10.1093/ofid/ofx163.1059.

Full text
Abstract:
Abstract Background Retention in care is critical for treatment and prevention of HIV. Many HIV care clinics measure retention rate, but data are often incomplete for patients who are classified as lost to follow-up but may be actually in care elsewhere, moved, or died. The Data to Care (D2C) initiative supports data sharing between health departments and HIV providers to confirm patient care status and facilitate reengagement efforts for out of care HIV patients. Methods The University of Chicago Medicine (UCM) provided an electronic list to the Chicago Department of Public Health (CDPH) of adult HIV-positive patients whose retention status was not certain. Retention in care was defined as at least 2 visits >90 days apart within the prior 12 months. CDPH matched this list of patients with data from the Chicago electronic HIV surveillance database. Matches were based on patient name, including alternative spellings and phonetics, and birth date. CDPH also cross-checked patient names with the CDC’s national enhanced HIV-AIDS Reporting System (eHARS) database. CDPH provided UCM with patient current care status, i.e., patient was in care elsewhere (as verified by lab data), moved out of state, or deceased. Results 780 HIV-positive patients received care in the UCM adult HIV clinic from January 1, 2013 to March 31, 2017. Of these, 360 were retained in care as of March 2017. We shared data with CDPH for 492 patients. Of these, 294 (59.8%) were matched, and 168 (34.1%) had a date of last medical care provided. See Table 1 for patient dispositions, before and after data sharing. 24 (13.4%) of patients believed to be lost to follow up according to UCM records were confirmed either transferred care or deceased according to health department data. Conclusion Data sharing between the health department and HIV providers can improve data accuracy regarding retention in care among people living with HIV. Disclosures J. P. Ridgway, Gilead FOCUS: Grant Investigator, Grant recipient; D. Pitrak, Gilead Sciences FOCUS: Grant Investigator, Grant recipient
APA, Harvard, Vancouver, ISO, and other styles
5

Mutze, Greg, Ron Sinclair, David Peacock, John Kovaliski, and Lorenzo Capucci. "Does a benign calicivirus reduce the effectiveness of rabbit haemorrhagic disease virus (RHDV) in Australia? Experimental evidence from field releases of RHDV on bait." Wildlife Research 37, no. 4 (2010): 311. http://dx.doi.org/10.1071/wr09162.

Full text
Abstract:
Context. European rabbits are serious environmental and agricultural pests throughout their range in Australia. Rabbit haemorrhagic disease virus (RHDV) greatly reduced rabbit numbers in arid central Australia but had less impact in cooler, higher-rainfall areas. RHDV-like benign caliciviruses (bCVs) have been implicated in limiting the impact of RHDV in the higher-rainfall regions of Australia and also in Europe. Aims. Experimental releases of RHDV on bait were tested as a means of initiating disease outbreaks. Serological evidence of antibodies to bCVs was examined to determine whether they reduce mortality rates and/or spread of the released RHDV, and how that might influence the effectiveness of future RHDV releases for rabbit management. Methods. Four experimental releases were conducted in high-rainfall and coastal regions of southern Australia. Virus activity was implied from recapture rates and serological changes in marked rabbits, and genetic sequencing of virus recovered from dead rabbits. Changes in rabbit abundance were estimated from spotlight transect counts. Key results. Release of RHDV on bait produced disease outbreaks that challenged almost all animals within the general release area and spread up to 4 km beyond the release sites. Recapture rates were high in marked rabbits that possessed antibodies from previous exposure to RHDV and extremely low amongst rabbits that lacked any detectable antibodies. Rabbits carrying antibodies classified as being due to previous infection with bCVs had recapture rates that were dependent on circulating antibody titre and were ~55% of recapture rates in rabbits with clear antibodies to RHDV. Conclusions. This is the first quantified evidence that antibodies produced against bCVs provide significant protection against RHD outbreaks in field populations of rabbits. Implications. bCVs can greatly reduce the impact of RHDV on wild-rabbit populations in Australia and presumably elsewhere. RHDV can be effectively released on bait although further releases are likely to be of minor or inconsistent benefit for controlling rabbit numbers where bCVs are common.
APA, Harvard, Vancouver, ISO, and other styles
6

Smith, Geoffrey C., Michael Mathieson, and Luke Hogan. "Home range and habitat use of a low-density population of greater gliders, Petauroides volans (Pseudocheiridae: Marsupialia), in a hollow-limiting environment." Wildlife Research 34, no. 6 (2007): 472. http://dx.doi.org/10.1071/wr06063.

Full text
Abstract:
Greater gliders, Petauroides volans, were radio-tracked within a large tract of forest in the dry inland of southern Queensland. This forest has been commercially logged for timber for more than 100 years. Home-range estimates ranged from 1.4 ha (female) to 19.3 ha (male). Minimum convex polygon (MCP) estimates were larger for males (average, 11.5 ha) than females (average, 3.3 ha) and combined (6.8 ha, sexes pooled) were larger than estimates from other Australian populations. Gliders were located foraging in myrtaceous tree species only, using mostly Eucalyptus moluccana, E. fibrosa and Corymbia citriodora. E. moluccana was used for foraging more frequently than would be expected on the basis of its availability in the forest. E. fibrosa and C. citriodora were used in proportion to their availability in the forest. Gliders were not seen foraging in non-myrtaceous species or myrtaceous trees <20 cm diameter at breast height (dbh), preferring trees in 30–70-cm dbh classes and as ‘mature’ and ‘over-mature’ classified according to growth-stage characteristics. Den tree species included the same species used for foraging as well as dead trees (16% of den trees). E. fibrosa and E. tereticornis were preferred significantly more than expected by their availability in the forest. Non-myrtaceous species were not used as live den trees. Large (dbh >50 cm) and old living trees (in deteriorating and senescent condition: ‘late mature’ and ‘over-mature’ categories) were primarily used as den trees. Individual gliders utilised 4–20 den trees. Females utilised more den trees per unit area of home range (3.8 den trees ha–1, maximum) than males (0.9 den trees ha–1, maximum). Fewer den trees were used per unit area of home range than by gliders at a coastal location with approximately the same latitude. The density of live stems containing hollows suitable as dens is currently lower than 1 tree ha–1 in some parts of the study forest. Gliders were two and half times less likely to be observed during standardised spotlighting surveys in the study area than elsewhere in southern Queensland. It is likely that low availability of den trees is contributing to large home ranges and the apparent low population density observed in this study.
APA, Harvard, Vancouver, ISO, and other styles
7

REICHMAN, R. "Law Elsewhere." Novel: A Forum on Fiction 37, no. 3 (June 1, 2004): 358–59. http://dx.doi.org/10.1215/ddnov.037030358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Du Bois-Pedain, Antje. "SEEKING HEALTHCARE ELSEWHERE." Cambridge Law Journal 66, no. 1 (March 2007): 44–47. http://dx.doi.org/10.1017/s0008197307000359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Duron, Rebecca, Michael Mugavero, and Andrew Westfall. "2497." Journal of Clinical and Translational Science 1, S1 (September 2017): 81. http://dx.doi.org/10.1017/cts.2017.286.

Full text
Abstract:
OBJECTIVES/SPECIFIC AIMS: Approximately 50% of people who have been diagnosed with HIV are either not linked to a care provider or not retained in medical care. This has substantial implications for both individual and public health outcomes. On an individual level, being retained in care is necessary for continuous receipt of antiretroviral therapy and sustained viral suppression. The public health implications of poor retention in HIV care are also serious, as it is estimated that people with HIV who are not retained in medical care are responsible for a majority of HIV transmissions, even more than the number of transmissions attributable to those who are HIV infected but undiagnosed. State departments of health routinely collect surveillance data including positive HIV test results, CD4 counts and viral load measures for monitoring trends in HIV infection. A shift in the use of these surveillance measures, guided by the CDC, has brought forth the opportunity to use these data for direct patient services and, more specifically, to direct re-engagement and retention in care efforts. Although the risk factors for poor retention in HIV care have been characterized using information from individual or multiple clinics, this study seeks to incorporate state surveillance data into the retention measures. METHODS/STUDY POPULATION: This retrospective cohort study was performed at the University of Alabama at Birmingham 1917 HIV/AIDS Clinic among patients with at least one attended HIV primary care visit during the calendar year of 2015. Retention during the calendar year of 2016 was then measured as whether or not a patient had 2 or more completed clinic visits which were separated by more than 90 days (in accordance with the Health Resources and Services Administration or HRSA guidelines, a National HIV Quality Indicator). For patients who did not have any primary care visit in 2016, the Alabama Department of Public Health will provide a status of care (out of care, in care elsewhere, died, moved out of state, and cannot locate) based on HIV laboratory results reported from all clinics and labs across the state and/or mortality information. A multinominal regression model of the status of care will be fitted to demographic, clinical, laboratory, and behavioral patient reported outcomes captured during an index visit in 2015. RESULTS/ANTICIPATED RESULTS: Data were recently obtained and is currently being analyzed on 3107 patients included in this study. We anticipate that there will be differences in the factors significantly associated with patients classified as out of care, poorly retained (patients who have only one completed clinic visit), and retained in care by the HRSA measure during calendar year 2016. DISCUSSION/SIGNIFICANCE OF IMPACT: By incorporating state surveillance data into our analysis, we expect to obtain a more precise picture of the risk factors for poor retention among HIV patients. For the first time, we will be able to determine if patients lost to our HIV clinic (~10% annually) are entirely lost to medical care or are seeking care elsewhere as indicated by HIV lab data reported to public health via surveillance. Identified risk factors will then be able to better inform the efforts to proactively improve the efficiency for HIV patient retention and re-engagement, and therefore lead to better individual outcomes for HIV patients and reduce the incidence of new HIV cases.
APA, Harvard, Vancouver, ISO, and other styles
10

TAYLOR, SAVITRI. "Protection Elsewhere/Nowhere." International Journal of Refugee Law 18, no. 2 (June 1, 2006): 283–312. http://dx.doi.org/10.1093/ijrl/eel007.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Law not elsewhere classified"

1

Teklu, Asmelash Yohannes. "Striking the balance between conforming to human rights standards and enacting anti-terrorism legislation : a challenge of the 21st century : an Ethiopian perspective." Thesis, University of Lincoln, 2014. http://eprints.lincoln.ac.uk/14695/.

Full text
Abstract:
The attacks against the United States of America (US) on 11 September 2001 paved the way for the coming into effect of much counter-terrorism legislation across the world. Ethiopia is one of the countries that have introduced new legislation on terrorism, which is mainly drawn from the UK and, to a lesser extent, from the US. The aim of this thesis is to comprehensively assess Ethiopia's counter-terrorism legislation in light of the experiences of the UK and the US in dealing with terrorism. Furthermore, this thesis discusses the consequences of ‘copying' Western counter-terrorism legislation into Ethiopian culture, drawing particular attention to the need for a proper balance between legitimate security interests and the protection of fundamental rights. This thesis is organized as follows. The first chapter introduces the significance, methodology, limitation, and scope of the thesis. The second chapter discusses the development of Ethiopian legal system, human rights and counterterrorism measures. Moving forwards, chapter three seeks to analyse two important factors encapsulated within the right to freedom of expression; that is, the content and medium of the expression and the identity of the speaker/publisher. The relevance of these factors in giving effect to the right to freedom of expression is evaluated in light of the need to protect against the incitement and/or encouragement of terrorism. The chapter then deepens its critical assessment by reviewing the difficulty of implementing these factors in Ethiopia. Chapter four seeks to widen the debate by exploring the legal regimes governing intercept evidence - an issue of great importance in terrorism discourse. The chapter critically examines why intercept evidence obtained through a warrant is inadmissible in UK courts. Additionally, this chapter compares the position of the UK with that of the US, isolating areas of similarities and differences with a view to comparing the Ethiopian position on intercept communications. Chapter five focuses on the arrest of individuals on suspicion of terrorism and the length of pre-charge detention under the three countries selected for this research. This chapter will then explore whether there is a need for a watered down version of ‘reasonable suspicion' in terrorism cases. This chapter further considers Ethiopia's position with regard to the level of knowledge required to execute arrests, considering whether Ethiopia could and should reflect on the UK's position in attempting to facilitate a greater accordance with fundamental rights by shortening the 120 days pre-charge detention currently available to police when arresting individuals on suspicion of terrorism. The final chapter draws on the preceding debate and provides the concluding remarks on the thesis.
APA, Harvard, Vancouver, ISO, and other styles
2

Eben, Rachael Arreh. "A cross-country investigation of international vessel-source legislation and oil pollution compliance practices : the case of Nigeria and the United States." Thesis, University of Central Lancashire, 2016. http://clok.uclan.ac.uk/16639/.

Full text
Abstract:
Environmental issues, the frequency of oil accidents, liability and compensation, and issues related to the efficacy of oil legislation proliferate oil discourse. In addition, there is good amount of literature on the use of deterrence in the criminal justice system. However, literature on the connection between compliance and deterrence practices in the oil transportation industry is patchy, especially about less-developed economies. Where an attempt is made to assess compliance practices in the oil industry, there is a general drift towards bunching compliance experiences along regional lines or regional players; (Asian countries, EU countries), or coastal states, port states and flag states. Another tendency is to evaluate the activities in a few developed economies (United States, United Kingdom, Netherlands, Australia, Japan, Germany or France) and transpose that as representation of what prevails in all other developed countries or other economies. This study takes a holistic approach by synthesizing the environmental, regulatory, and socio-economic issues related to compliance with vessel-source legislation in just two specific jurisdictions without getting trapped by the bunching idea. Therefore, the focus of this research has been to investigate the compliance practices of two economies- Nigeria and the United States- against the backdrop of existing deterrent international and domestic vessel- source legislation. The enforcement corridor by stakeholders leaves grounds for flaunting of some relevant provisions, thus necessitating an investigation into the compliance practices of both economies in order to seek ways to deter those rogue practices. Additionally the study aims to design a framework that would enable decision-makers within the studied jurisdictions to frame their compliance decisions based on relevant environmental, regulatory, and socio- economic indicators that are targeted at reducing oil pollution from malfeasors. To this end, using a combination of black-letter approach, socio-legal methodology, comparative analysis, and questionnaires, the project aims to synthesize these methods with case laws and case studies, and apply the framework designed to the two economies. Evidently at the level of international oil tanker transportation, there is noticeable tightening of control and more reasonable compliance. However, domestic compliance practices in both the developed and less-developed economies could do better. On the whole, the international regimes have succeeded to deter some rogue behavior and foster compliance with some aspects of the trade, but would require severity and certainty of regulatory adjustments to attain a spill- free vessel-tanker trade that prevents pollution.
APA, Harvard, Vancouver, ISO, and other styles
3

Ball, Yvonne. "Privacy rights in employment." Thesis, University of Central Lancashire, 2008. http://clok.uclan.ac.uk/21606/.

Full text
Abstract:
This thesis undertakes to research the development of domestic legal protection for privacy rights within employment. Unusually for a current work, it does this by returning to the genesis of the protections. The work challenges pervasive arguments that the notion of confidence did not protect privacy and exceptionally argues that the earliest incarnation of the notion of confidence was well equipped to protect private and personal information against disclosure. The thesis puts forward the novel view that the problems that have arisen in providing domestic protection for such information, in the absence of a right to privacy, are the result of an unfortunate narrowing of the original notion. This position is underpinned by the contention that a number of cases misinterpreted the nature of the original tort and did not fully recognise the requirement to provide protection against the acquisition of personal information. The historical analysis contributes to current knowledge by providing an alternative interpretation of the historical legal framework. This analysis provides an unorthodox assessment of the opportunities provided to the courts by the notion of confidence, to enhance both the theory and practical impact of the protection of privacy rights within employment Furthermore the thesis evaluates a broad range of case law from the European Court of Human Rights. These include general privacy cases, those involving wrongdoers as well as general employment cases. These cases are used to identify any consistent themes or conflicts in the application of the right to privacy. The evaluation produces a highly developed analysis and uncovers the latent significance of employment policies in both the protection of and the intrusion into, an employee's privacy. Most notably and distinctively the thesis identifies the important role that a well-crafted policy can have in augmenting an insubstantial legislative framework, provided that some legal basis provides the foundation for the policy. This evaluation also exposes the implications of any policy, which provides the basis for an interference with an employee's privacy and unconventionally highlights that the mere existence of such a policy can of itself amount to an intrusion, whether or not it is put into practice. Moreover, the thesis considers whether the incorporation of the right to privacy into domestic law has any impact upon private sector employers and employees. It heightens knowledge of the positive obligations placed upon the state and the courts to protect the right to privacy of all individuals against intrusions by the state and significantly against intrusions by other individuals or private sector organisations. The thesis therefore provides a valuable addition to current understanding of the interventionist and rigorous protections for privacy rights within employment, provided by the Strasbourg Court. This in turn provides the foundation for the unique evaluation of how effectively the right to privacy is incorporated into current domestic law. The thesis has taken the valuable opportunity provided by the tenth anniversary of the publication of the Human Rights Act 1998 to consider its impact upon privacy rights within employment. It takes advantage of the occasion to re-evaluate the categories of confidence and privacy and to analyse the principles underpinning the notions within domestic courts. The work exceptionally compares the development of domestic employment law with the development of general civil and criminal cases. This is an effective structure, which facilitates the development of arguments outlining how privacy rights within employment can be more effectively recognised and protected. The thesis does not shirk the challenges posed by the complex and difficult piece of legislation known as the Regulation of Investigatory Powers Act 2000, a particularly puzzling statute'. 1 It singularly and painstakingly reviews its provisions and questions whether accepted interpretations are correct or workable. The work offers an independent analysis of the rationale and application of its terms and brings to light the finding that despite its name Part II of the Act does not provide any powers and does not regulate the use of any existing powers but merely provides a framework, by which, intrusions may be undertaken by public authorities 'in accordance with the law' where there is no other statutory basis for the interference. The thesis makes an interesting case that other than where it creates criminal offences and civil liabilities for the interception of communications2, it has little if any effect upon the monitoring of employees, whether in the public or private sectors. The thesis also evaluates the Data Protection Act 1998 and The Employment Practices Code. It originally asserts that the Act and the Code provide the statutory basis for employers to intrude into the private lives of employees and prospective employees 'in accordance with the law' where it is necessary and proportionate to so; providing the employer has established and published policies that make the intrusion foreseeable in the circumstances. The fact that these arguments need to be evaluated and explained, naturally leads to the explicit conclusion that the incorporation of the rights protected by Article 8 in the statutory framework have failed to supply the necessary clarity to provide forseeability or to give, strengthen or explicitly restrict privacy rights within employment. Additionally, the creative comparison with the general privacy and criminal cases brings to light the evident disparity in the development of the case law in these areas compared with the development within employment cases. The thesis sets out the &adual but definite maturing of the protection noticeable in general privacy and criminal cases, particularly in v W [2003] EWCA Crim 1632 p. 98 2 Which themselves are modified by the Telecommunication (Lawful Business Practice) (Interception of Communications) Regulations, 2000 L1 relation to wrongdoing and rehabilitation, arguing that this has yet to filter into the employment cases. This leads to proposals for reform to remove the evident confusion for employers, employees, legal advisors, those providing oversight and commentators. The proposals encourage the judiciary to embrace the challenges and possibilities provided by the Human Rights Act 1998 to provide appropriate protections for privacy rights within employment. The thesis provides a platform for further research within this area and makes recommendations as to how the findings could be developed by both empirical research or by further comparative studies. The unusual approach to the research, the original nature of the findings and proposals for reform provide a valuable contribution to knowledge of the domestic legal framework, both statutory and common law suggesting both how it may be more effectively applied and how it could profitably be developed and clarified for both employers and employees. The thesis has thereby moved the debate to a different theoretical place from the established view of the ability of domestic law to effectively protect privacy rights within employment.
APA, Harvard, Vancouver, ISO, and other styles
4

Laverick, Craig. "Enforcing the ISM Code, and improving maritime safety, with an improved Corporate Manslaughter Act : a safety culture theory perspective." Thesis, University of Central Lancashire, 2018. http://clok.uclan.ac.uk/23768/.

Full text
Abstract:
The International Safety Management (ISM) Code was introduced in 1998 in response to a number of high-profile maritime disasters, with the aim of establishing minimum standards for the safe operation of ships and creating an enhanced safety culture. It was the first piece of legislation introduced by the International Maritime Organisation that demanded a change in the behaviour and attitude of the international maritime community. Whilst there is no doubt that the ISM Code has been successful at improving maritime safety, there is now an increasing problem with complacency. The aim of this thesis is to consider how complacency with the ISM Code in the UK can be tackled by using reformed corporate manslaughter legislation. This thesis adopts a Safety Culture Theory approach and uses a multi-model research design methodology; a doctrinal model and a socio-legal model. The thesis hypothesis and the author's proposed corporate manslaughter reforms are tested through case studies and a survey. The thesis proposes the introduction of secondary individual liability for corporate manslaughter, in addition to existing primary corporate liability. If the proposed provisions were to be implemented, a gap in the law would be filled and, for the maritime industry, both the ship company and its corporate individuals would be held accountable for deaths at sea that are attributable to non-implementation of the ISM Code. It is suggested that this would deter further ISM complacency and so encourage the ISM Code’s intended safety culture. This thesis contributes to the intellectual advancement of the significant and developing interplay between criminal and maritime law, by adding to the scholarly understanding of the safety culture operating within the international maritime community, and examining how corporate manslaughter legislation could be used to improve implementation of the ISM Code. It offers sound research for consideration by legal researchers and scholars, and also by those working within the field of maritime safety regulation.
APA, Harvard, Vancouver, ISO, and other styles
5

Randall, Vicki Louise. "Changes in diversionary strategies within the youth justice system of England & Wales (1908-2010)." Thesis, University of Bedfordshire, 2011. http://hdl.handle.net/10547/133096.

Full text
Abstract:
Youth justice in England and Wales is a highly politicised area of government policy and youth justice provision has always been a highly contested issue. The discourse of diversion stems from debates about the purpose and effectiveness of various types of penal regimes, and particularly their effect on children and young people in trouble with the law. The process of diversion aims to remove children and young people from the formal sanctions of the criminal justice system or minimize their penetration into it, and failing that it aims to avoid incarceration. Over the years diversion has taken many forms and the extent to which children have been diverted has varied. This thesis explores the various types of diversionary practice and how they have changed over time. It explores the political, administrative and professional conditions under which diversion has been a priority and those under which it has been effective. Bernard (1992) has argued that there is a ‘cycle of youth justice’ in which responses to youth crime move from the harsh to the more lenient before swinging back again. The thesis suggests that there is a ‘spiral’ of youth justice in which different paradigms are sometimes entangled together leading to the often contradictory and complex realities of youth justice and diversion without necessarily returning to the place of origin. It concludes that, given the current fiscal climate, there is a distinct likelihood that diversion policies will gain ascendancy. However, any developments will be fragile and susceptible to unintended consequences if the ‘real’ outcomes for children and young people are not part of the motivation for reform.
APA, Harvard, Vancouver, ISO, and other styles
6

Cushing, Karen. "An analysis of the mandatory admission criterion within youth justice diversionary processes." Thesis, University of Bedfordshire, 2016. http://hdl.handle.net/10547/622545.

Full text
Abstract:
‘To require old heads upon young shoulders is inconsistent with the law’s compassion to human infirmity’ (Lord Diplock in Director of Public Prosecutions v Camplin Appellant [1978] AC 717)’. For young people in England and Wales who offend, diversion from formal proceedings has historically been a principle constituent of youth justice policy and practice, and presently accounts for over a third of all outcomes for detected youth offending (Youth Justice Board for England and Wales, 2015). Although attitudes concerning diversion have often oscillated between favour and criticism, and there has rarely been a period of sustained consensus or constancy of processes (Bernard, 1992; Goldson, 2010), eligibility for an out of court disposal has traditionally been dependent on an admission of some form being made by a young person. This thesis seeks to place the evolution of diversionary measures for young people who commit low level offences or engage in nuisance behaviours into a contextual and historical context, and explore why an admission has become, in the absence of any discernible political, academic or professional considerations, a central tenet of diversionary policies in England and Wales. Potential barriers which may prevent some young people making an admission and unnecessarily losing eligibility for an out of court disposal are considered, as well as the nature and standard of admission expected from young people, and the circumstances in which admissions are usually sought from them. This thesis also explores whether the mandatory admission criterion is compatible with other statutory and international obligations to consider the welfare of a young person when determining a suitable disposal, and whether it sufficiently distinguishes between young people unwilling to make an admission and those who may feel unable to. The thesis seeks to identify the gaps in current academic and professional knowledge concerning whether some young people may unnecessarily forfeit eligibility for a diversionary outcome for the sole reason that they do not make an admission. The research undertaken with relevant professionals’ endeavours to fill these gaps by exploring the practical application of the admission criterion, as well considering any suitable alternatives within the existing statutory regime.
APA, Harvard, Vancouver, ISO, and other styles
7

Alkiviadou, Natalie. "Challenging right-wing extremism in England and Wales and Greece : tools available in international, European and national law." Thesis, University of Central Lancashire, 2017. http://clok.uclan.ac.uk/18239/.

Full text
Abstract:
The destructive force of the far-right was tragically witnessed through the mass devastation brought about by World War II. The international community sought to prevent the repetition of such destruction through the establishment of institutions, such as the United Nations, and the adoption of documents such as the Universal Declaration of Human Rights and the European Convention on Human Rights. Jurisprudence and conventions on a supranational level directly prohibit speech and expression of the far-right with, for example, Article 4 of the International Convention on the Elimination of All Forms of Discrimination prohibiting racist associations and racist expression. Nevertheless, we are living in a world where violent far-right entities, such as Golden Dawn of Greece, have received unprecedented electoral support, where xenophobic parties have done spectacularly well at the latest European Parliament elections, where the United Kingdom has voted to leave the European Union and where Donald Trump has been elected as the next president of the United States of America. As such, the far-right is no longer a phenomenon of the past. It is one of the present, rising at swift and worrying rates. In this light, the study analyses how supranational bodies, namely the United Nations, the Council of Europe and the European Union, require their members to tackle right-wing extremism either directly, or through the regulation of by-products of right-wing extremism, such as hate speech. The adherence to international obligations is examined through an assessment of two jurisdictions, namely, England and Wales and Greece. For purposes of this thesis, supranational obligations emanate from, inter alia, instruments such as the International Covenant on Civil and Political Rights, the International Convention on the Elimination of All Forms of Racial Discrimination and the European Convention on Human Rights. It must be noted that, on an EU level, there is also a centralised mechanism in the form of Article 7 TEU which can, in theory, be used against Member States which embrace a far-right ideology or, potentially, tolerate the far-right. However, this tool has never been used. The dissertation considers the means and methods adopted by the jurisdictions under consideration to interpret and apply international and European obligations through their national legal systems along with a broader conceptualisation of their legal and judicial approaches to right-wing extremism. The country analyses commence with an assessment of their adherence to international and European obligations, the thesis looks at the case-studies' domestic frameworks in the realm of challenging far-right movements. For both countries, there is a legal analysis of how central rights and freedoms, such as non-discrimination, expression, assembly and association, are established by law. For England and Wales, it proceeds to look at the role of criminal law in relation to the far-right, assessing the public order ambit which is the one most habitually used to challenge the rhetoric and activities of the far-right. This is followed by an evaluation of recent anti-terror legislation which has come into play in relation to the regulation of violent elements of the far-right movement. After looking at criminal law and how it deals with ensuring public order and countering terror, the assessment of England and Wales looks at how national law treats political parties before registration and during their functioning. The purpose is to determine what tools and sub-tools are available and can be used for challenging far-right parties contesting elections. From the above-described analysis, it is concluded that the legal framework of England and Wales embraces the significance of the freedom of expression but readily allows for the limitation of speech if issues of public order, terrorism or anti-social behaviour arise. Assemblies are also readily prohibited if public order or anti-social behaviour issues arise. What is clear is that this case-study is not willing to proscribe associations if such associations do not amount to terrorist organisations. In relation to Greece, the dissertation assesses the principal legal instrument that tackles issues relevant to challenging the far-right, namely the criminal law framework and particularly the law on the punishment of racially discriminatory acts, and relevant provisions of the Greek Penal Codes such as those on racial aggravation and criminal and terrorist organisations. It also look at the non-discrimination law which is relevant to this case-study given Golden Dawn's provision of services to Greeks only. It became evident from the analysis that relevant legislation has seldom been relied upon to challenge the far-right in Greece, a reality which has led to a state of impunity for the criminal activities of Golden Dawn and an issue that has become a key concern for national and international human rights institutions and non-governmental organisations. Although some members of Golden Dawn were convicted for their criminal activities and the Court recognised their affiliation with Golden Dawn, before the murder of an ethnic Greek, no steps were taken against the organisation. The chapter incorporates an analysis of the legal basis of the ongoing trial against Golden Dawn. Furthermore, the chapter also looks at how national law treats political parties before registration and during their functioning. This analysis demonstrated that political parties, even ones with dangerous and undemocratic intentions, can register and function without limitations with the only point of State intervention being when such entities cross into the threshold of a criminal organisation, as was the case of Golden Dawn.
APA, Harvard, Vancouver, ISO, and other styles
8

Bailey, Joan. "The significance of inter-racial conflict in the identity formation of BME young people." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/344603.

Full text
Abstract:
Amidst growing concerns due to a rise in incidents of inter racial conflict between African Caribbean and South Asian young men; this thesis draws on the concept of identity formation as an instigating factor in terms of why young people may get embroiled in conflict with other cultural groups. Drawing on semi structured questionnaires with professionals and community workers, an ethnographic study with young people involved in or party to the incidents and a few in depth focus groups it explores the historical issues associated with the conflict, the development of identity and how and why this may be different for those from Black and Minority Ethnic (BME) groups and how it can then materialise into conflict when threatened. It aims to contribute to practice, knowledge and understanding of inter racial conflict and how the creation of positive identities can reduce these incidents. It also seeks to identify approaches and interventions most likely to be effective in addressing this which include working with parents, carers and the wider community who may carry some of the historical issues that allow the conflict to exist. Findings point to identity formation being complex and multifaceted, which can be affected through personal and social experiences: many of these being different for young people from BME communities. Identity is fragile and can be shaped and changed through these experiences which can be compounded by interrelated needs and anxious backgrounds which can then manifest into behaviour that targets those that they may feel threatened by. This study cites the importance of cultural specific responses and interventions which are holistic, informal and flexible to meet the distinct needs of not only young people but those that are influential in their lives. In addition it highlights the importance of work associated with identity formation and the creation of positive identities as a precursor to reducing conflict situations.
APA, Harvard, Vancouver, ISO, and other styles
9

(6641012), Genisson Silva Coutinho. "FACULTY BELIEFS AND ORIENTATIONS TO TEACHING AND LEARNING IN THE LAB: AN EXPLORATORY CASE STUDY." Thesis, 2019.

Find full text
Abstract:
This dissertation presents a two-phase multiple case study conducted to investigate the faculty
beliefs regarding the integration of labs into engineering and engineering technology education
and the relationship between such beliefs and the teaching practices adopted in the labs. In the first
phase, an exploratory study grounded on a framework of beliefs was conducted to elicit the beliefs
espoused by the participants. Interviews were used to elicit the participants’ beliefs. The
transcribed interviews were analyzed through the constant comparative method. Thirteen faculty
members from the College of Engineering and Engineering Technology participated. In the second
phase, a triangulation approach was used to investigate the relationships between the participants’
beliefs and their corresponding teaching practices. The findings from phase one were triangulated
with the data from interviews, questionnaires, and documents to elicit the relationships between
beliefs and practices.
APA, Harvard, Vancouver, ISO, and other styles
10

Murphy, Travis. "Buying across price tiers in the Australian wine market." 2006. http://arrow.unisa.edu.au:8081/1959.8/46371.

Full text
Abstract:
This masters thesis titled 'Buying across price tiers in the Australian wine market' explores if the duplication of purchase law (DoP) can be used to describe how consumers purchase across price tiers. The law has traditionally been used to describe how consumers buy across different brands in repeat purchase markets over time. This thesis builds on the generalisability of the DoP law by applying it to how consumers buy from different price tiers in a market where much price choice exists.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Law not elsewhere classified"

1

Bois, François Du. Equality law: Reflections from South Africa and elsewhere. Claremont [South Africa]: Juta, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Classified: Secrecy and the state in modern Britain. New York: Cambridge University Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Division, United States Marshals Service Executive Services. Classified national security information: Reference booklet. Washington, D.C.?]: U.S. Dept. of Justice, Marshals Service, Executive Services Division, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Uganda. The Public Finance and Accountability (Classified Expenditure) Regulations, 2003. Kampala]: Republic of Uganda, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Spain. Defense, data exchange: Agreement between the United States of America and Spain, signed at Washington June 19, 1980. Washington, D.C: Dept. of State, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Security clearance law and procedure. 2nd ed. Arlington, Va: Dewey Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Newman, Elizabeth L. Security clearance law and procedure. Arlington, Virginia: Dewey Publications, Inc., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Heels, Erik J. The legal list: Internet desk reference : law-related resources on the internet & elsewhere. Rochester, N.Y: Lawyers Cooperative Publishing, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

US GOVERNMENT. Classified national security information: E.O. 12958 and its implementing directives. [Washington, D.C.?]: Information Security Oversight Office, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vietnam. Pháp lệnh bảo vệ bí mật nhà nước và văn bản hướng dã̂n thi hành. Hà Nội: Nhà xuá̂t bản Chính trị quó̂c gia, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Law not elsewhere classified"

1

Allen, Ronald J. "Law and Philosophy in China and Elsewhere." In Facts and Evidence, 3–14. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9639-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schauer, Frederick. "Why Precedent in Law (and Elsewhere) Is Not Totally (or Even Substantially) About Analogy." In Legal Argumentation Theory: Cross-Disciplinary Perspectives, 45–56. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-4670-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Reid, William H. "Psychotic Disorders Not Elsewhere Classified." In The Treatment of Psychiatric Disorders, 200–203. Routledge, 2018. http://dx.doi.org/10.4324/9781315825908-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wicoff, James S. "Speech Disorders Not Elsewhere Classified." In The Treatment of Psychiatric Disorders, 41. Routledge, 2018. http://dx.doi.org/10.4324/9781315825908-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reid, William H. "Impulse Control Disorders Not Elsewhere Classified." In The Treatment of Psychiatric Disorders, 314–20. Routledge, 2018. http://dx.doi.org/10.4324/9781315825908-28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Farrington, David P. "Psychosocial causes of offending." In New Oxford Textbook of Psychiatry, 1908–17. Oxford University Press, 2012. http://dx.doi.org/10.1093/med/9780199696758.003.0253.

Full text
Abstract:
Offending is part of a larger syndrome of antisocial behaviour that arises in childhood and tends to persist into adulthood. There seems to be continuity over time, since the antisocial child tends to become the antisocial teenager and then the antisocial adult, just as the antisocial adult then tends to produce another antisocial child. The main focus of this chapter is on types of antisocial behaviour classified as criminal offences, rather than on types classified for example as conduct disorder or antisocial personality disorder. In an attempt to identify causes, this chapter reviews risk factors that influence the development of criminal careers. Literally thousands of variables differentiate significantly between official offenders and non-offenders and correlate significantly with reports of offending behaviour by young people. In this chapter, it is only possible to review briefly some of the most important risk factors for offending: individual difference factors such as high impulsivity and low intelligence, family influences such as poor child rearing and criminal parents, and social influences: socio-economic deprivation, peer, school, community, and situational factors. I will be very selective in focussing on some of the more important and replicable findings obtained in some of the more methodologically adequate studies: especially prospective longitudinal follow-up studies of large community samples, with information from several data sources (e.g. the child, the parent, the teacher, official records) to maximize validity. The emphasis is on offending by males; most research on offending has concentrated on males, because they commit most of the serious predatory and violent offences. The review is limited to research carried out in the United Kingdom, the United States, and similar Western industrialized democracies. More extensive book length reviews of antisocial behaviour and offending are available elsewhere.
APA, Harvard, Vancouver, ISO, and other styles
7

"Commodities and transactions not classified elsewhere in the SITC." In International trade statistics yearbook 2013, Volume II: trade by commodity, 421–23. UN, 2014. http://dx.doi.org/10.18356/077e9000-en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"Commodities and transactions not classified elsewhere in the SITC." In International trade statistics yearbook 2012, Volume II, 421–24. UN, 2014. http://dx.doi.org/10.18356/931bb080-en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"RULES—IN LAW AND ELSEWHERE." In Thinking Like a Lawyer, 13–35. Harvard University Press, 2012. http://dx.doi.org/10.2307/j.ctvjk2x3k.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jiménez-Ruano, Adrián, Pere Joan Gelabert, Victor Resco de Dios, Cristina Vega-García, Luis Torres, Jaime Ribalaygua, and Marcos Rodrigues. "Modeling daily natural-caused ignition probability in the Iberian Peninsula." In Advances in Forest Fire Research 2022, 1214–19. Imprensa da Universidade de Coimbra, 2022. http://dx.doi.org/10.14195/978-989-26-2298-9_184.

Full text
Abstract:
In the European Mediterranean region natural-caused wildfires are a small fraction of total ignitions. Lightning strikes are the most common source of non-human fires, being strongly tied to specific synoptic conditions and patterns associated with atmospheric instability, such as dry thunderstorms. Likewise, lightning-related ignitions often associate with dry fuels and dense vegetation layers. In the case of Iberian Peninsula, the confluence of these factors favors recurrent lightning fires in the eastern Mediterranean mountain ranges and the. However, under appropriate conditions lightning fires can start elsewhere, holding the potential to propagate over vast distances. In this work, we assessed the likelihood of ignition leveraging a large dataset of lightning strikes and historical fires available in Spain. We trained and tested a machine learning model to evaluate the probability of ignition provided that a lightning strikes the ground. Our model was calibrated in the period 2009-2015 using data for mainland Spain plus the Balearic Islands. To build the binary response variable we classified lightning strikes between that triggered a fire event. For each lightning strike we extracted a set of covariates relating fuel moisture conditions, the presence and density of the vegetation layer and the shape of the relief. The final model was subsequently applied to forecast daily probabilities at 1x1 km resolution for the entire Iberian Peninsula. Although the model was originally calibrated in Spain, we extended the predictions to the entire Iberian Peninsula. By doing so we were able to validate in the future our outputs against the Portuguese dataset of recent natural-caused fires (bigger than 1 ha) from 2001 to 2021. Overall, the model attained a great predictive performance with a median AUC of 0.82. Natural-caused ignitions triggered mainly in low dead (dFMC 250) fuel moisture conditions. Lightning strikes with negative polarity seem to trigger fires more frequently when the mean density of discharger was greater than 5. Finally, natural wildfires usually started at higher elevations (above 500 m.a.s.l.).
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Law not elsewhere classified"

1

Burns, John G. "Multilevel systems security and interoperability between differently classified networks." In Enabling Technologies for Law Enforcement and Security, edited by Edward M. Carapezza and David B. Law. SPIE, 1999. http://dx.doi.org/10.1117/12.336964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mateeva, Zhivka. "NATURE OF THE CONTROL OVER THE PROTECTION OF CLASSIFIED INFORMATION, CARRIED OUT BY THE STATE COMMISSION OF INFORMATION SECURITY." In THE LAW AND THE BUSINESS IN THE CONTEMPORARY SOCIETY 2020. University publishing house "Science and Economics", University of Economics - Varna, 2020. http://dx.doi.org/10.36997/lbcs2020.263.

Full text
Abstract:
The report examines the control activities of the State Commission of Information Security, as one of the bodies ensuring compliance with the rules for protection of classified information. Undoubtedly, the fast and efficient protection of classified information is a matter of great public importance, and the unregulated disclosure or disclosure of information, as well as illegal access to it can damage the interests of the state and its security to varying degrees. The control performs basic public functions such as the lawful application of the legislation governing the protection of classified information. Based on the performed analysis, conclusions are made regarding the effectiveness of the control activity of the commission for compliance with the legislation for protection of classified information.
APA, Harvard, Vancouver, ISO, and other styles
3

LaViolette, Marc. "On Moore’s Law and Its Application to SI Engine Technology." In ASME 2005 Internal Combustion Engine Division Fall Technical Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/icef2005-1237.

Full text
Abstract:
Moore’s law relates how the integration of semiconductors has progressed in time. This research shows that the exponential trend shown in the electronics manufacturing industry can have applications elsewhere. This study shows that the internal combustion engine followed the same trend for over 70 years. Though not the most used engine variable, engine power density shows the same trends for engines as transistor density does for microchips. This now mature technology has ended its period of rapid growth. However the present day engine trends can show how Moore’s law can be extended to include the slower growth of long established technologies. Because exponential growth cannot go on forever, the extension Moore’s law requires that the logistic function be used. The new function also allows one to predict a theoretical value for maximum power density.
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Dong. "Exploration on the Large Class Enrollment and Classified Cultivating of Computer Specialty." In Proceedings of the 1st International Symposium on Innovation and Education, Law and Social Sciences (IELSS 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/ielss-19.2019.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Grübel, Marius, Markus Schatz, and Damian M. Vogt. "Second Law Analysis of Condensing Steam Flows." In ASME Turbo Expo 2018: Turbomachinery Technical Conference and Exposition. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/gt2018-76388.

Full text
Abstract:
A numerical second law analysis is performed to determine the entropy production due to irreversibilities in condensing steam flows. In the present work the classical approach to calculate entropy production rates in turbulent flows based on velocity and temperature gradients is extended to two-phase condensing flows modeled within an Eulerian-Eulerian framework. This requires some modifications of the general approach and the inclusion of additional models to account for thermodynamic and kinematic relaxation processes. With this approach, the entropy production within each mesh element is obtained. In addition to the quantification of thermodynamic and kinematic wetness losses, a breakdown of aerodynamic losses is possible to allow for a detailed loss analysis. The aerodynamic losses are classified into wake mixing, boundary layer and shock losses. The application of the method is demonstrated by means of the flow through a well known steam turbine cascade test case. Predicted variations of loss coefficients for different operating conditions can be confirmed by experimental observations. For the investigated test cases, the thermodynamic relaxation contributes the most to the total losses and the losses due to droplet inertia are only of minor importance. The variation of the predicted aerodynamic losses for different operating conditions is as expected and demonstrates the suitability of the approach.
APA, Harvard, Vancouver, ISO, and other styles
6

Shibutani, Tadahiro, Tetsu Tsuruga, Qiang Yu, and Masaki Shiratori. "Interface Strength Between Sub-Micron Thin Films in Opening and Sliding Delamination Modes." In ASME 2002 International Mechanical Engineering Congress and Exposition. ASMEDC, 2002. http://dx.doi.org/10.1115/imece2002-39631.

Full text
Abstract:
Delamination between thin films is classified into two types: opening mode and sliding mode. Corresponding to each mode, there is the interface strength between thin films. This paper aims to evaluate interface strength between the sub-micron thin films for opening mode and sliding mode, respectively. We already developed the evaluation method of interface fracture toughness for opening mode on the basis of fracture mechanics concept elsewhere. Moreover, the evaluation method of sliding mode is proposed and the interface strength between thin films for an advanced LSI is evaluated as the fracture toughness by using both methods. In both modes, the stress singularity appears in the vicinity of the edge of interface and governs the delamination. The criterion of crack initiation for each mode is evaluated as the interface toughness. The fracture toughness at the edge of interface in sliding mode is lower than that in opening mode.
APA, Harvard, Vancouver, ISO, and other styles
7

Newman, Alan P., Diane Whitehouse, and Steve J. Smith. "Wildlife Protection Law as a Barrier to Sustainable Drainage Wetlands and Pools in the UK and Elsewhere: A Proposal for Legislative Change." In Ninth International Conference on Urban Drainage (9ICUD). Reston, VA: American Society of Civil Engineers, 2002. http://dx.doi.org/10.1061/40644(2002)265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

"What Should We Know, and When Can We Know It? Planetary Protection Precursors (Lunar and Elsewhere) to Human Mars Exploration." In 55th International Astronautical Congress of the International Astronautical Federation, the International Academy of Astronautics, and the International Institute of Space Law. Reston, Virigina: American Institute of Aeronautics and Astronautics, 2004. http://dx.doi.org/10.2514/6.iac-04-g.6.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kolçak, Menşure, and Ali Yasin Kalabak. "Do Government Expenditures Subject to Law of Diminishing Returns? A Panel Data Application." In International Conference on Eurasian Economies. Eurasian Economists Association, 2018. http://dx.doi.org/10.36880/c10.02212.

Full text
Abstract:
The effect of government expenditure on economic growth has attracted attention of economist for long time. In this context, this paper aims to understand that government expenditure subjects to whether constant, decreasing or increasing yield. For this reason, countries were classified as with low government expenditure, medium government expenditure and high government expenditure, and were added into empirical analysis in the paper. The number of countries included in the analysis is 138 and the analysis covers the period between years 1980 and 2016. In this context, empirical analysis consists of fixed effect model, random effect model, hausman test and unbalanced panel data technique was applied. According to results of analysis, when government expenditure increases as quantitative, it’s effect on economic growth decreases but it still affects economic growth positively. To make public expenditures lately subject to law of diminishing returns, it may come into question that public expenditures is canalized to technology intensive areas. In order to increase productivity in the public expenditures and to shift out diminishing returns, level of spendings on human capital can be increased.
APA, Harvard, Vancouver, ISO, and other styles
10

Vasiljević, Zoran, and Dragana Vasiljević. "BANKARSKA TAJNA – GRANICE ZAŠTITE." In 14 Majsko savetovanje. University of Kragujevac, Faculty of Law, 2018. http://dx.doi.org/10.46793/xivmajsko.999v.

Full text
Abstract:
The authors analyze in this paper the institute of the banking secrecy as from the aspect of the private law as well from the aspect of the public law. Banking secrecy represents an important institute of the banking law which is based on a high level of confidence between the bank and the client. However, public interests also imply an increasing need to circumvent this duty of banks toward clients. Therefore, in the paper was analyzed the content of the banking secrecy, then it was made its comparison and possible subduction under the institute of the business secrecy and were defined the limits of its protection. It is noted that banking secrecy still has civil law, misdemeanor law and criminal law protection, but in the more limited extent, due to exceptions whose existence requires an obligation to combat against financial terrorism, money laundering, tax fraud and other forms of financial crime. In addition, sometimes the justified interests of the banks themselves and of other private law entities impose the need for disclosure of classified informations
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Law not elsewhere classified"

1

Mazurkiewicz, Marek. ECMI Minorities Blog. German minority as hostage and victim of populist politics in Poland. European Centre for Minority Issues, February 2022. http://dx.doi.org/10.53779/fhta5489.

Full text
Abstract:
On 4 February 2022, the Polish Journal of Laws published a new ordinance of the Minister of Education and Science, implementing cuts in the funding of education of German as a minority language. Consequently, the hourly length of such lessons will be significantly reduced. This regulation applies exclusively to the German minority, and the official motive for introducing discriminatory measures is to improve the situation of Polish diaspora in Germany. This is the first time after 1989 when the Polish state authorities introduce a law limiting the rights of Poland’s citizens belonging to a national minority (in this situation children), as a retaliation for the alleged situation of a kin-community elsewhere. Importantly, the adopted regulations are not only discriminatory towards one of the minorities; their implementation may in fact contribute to the dysfunctionality of the entire minority education system in Poland. This is also an obvious violation of the constitutional principle of equality before the law, the right of minorities to ‘maintain and develop their own language’, international standards of minority rights protection, as well as a threat to the very functioning of human rights protection mechanisms in the country.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography