Non-monotonic transformation of access rights

Author(s):  
R.S. Sandhu ◽  
G.S. Suri
2016 ◽  
Vol 45 (2) ◽  
pp. 28-48 ◽  
Author(s):  
Isaac Dery

Women’s access to and control over productive resources, including land, has increasingly been recognized in global discussions as a key factor in reducing poverty, ensuring food security and promoting gender equality. Indeed, this argument has been widely accepted by both feminists and development theorists since the 1980s. Based on qualitative research with 50 purposively selected men and women, this study explored the complexity of women’s access to and control over land within a specific relationship of contestations, negotiations, and manipulations with men. Data were analyzed using thematic analysis. While theoretically, participants showed that women’s [secure] access to and control over land has beneficial consequences to women themselves, households and the community at large, in principle, women's access and control status was premised in the traditional framework which largely deprives women, equal access and/or control over the land. The study indicates that even though land is the most revered resource and indeed, the dominant source of income for the rural poor, especially women, gender-erected discrimination and exclusion lie at the heart of many rural women in gaining access to land. This study argues that women's weak access rights and control over land continue to perpetuate the feminization of gender inequality–while men were reported to possess primary access and control over land as the heads of households, women were argued to have secondary rights due to their ‘stranger statuses’ in their husbands’ families. Overall, the degree of access to land among women was reported to be situated within two broad contexts–marriage and inheritance.


2018 ◽  
Vol 28 (4) ◽  
pp. 1361-1365
Author(s):  
Ilhan Istikbal Ibryam ◽  
Byulent Mustafa Mustafa ◽  
Atti Rashtid Mustafa

With the introduction of Information Technology in educational process we need more often to use electronic evaluation. The examples of test variants in the secondary school are often prepared with the help of word processing editors as WordPad that has good opportunities for elementary text formatting. Another part of the teachers often use Microsoft Word when preparing their tests. It is true that Microsoft Word has much more editing and formatting instruments than WordPad. For access to electronic educational resources suggested by the school teachers two or more computer networks are built (teachers' and learners'). Using these networks and their access rights, each user, learner or teacher, has the opportunity to add files and directories into the school database (DB). Learners can add files with the exercises they have done during their classes. Teachers suggest through the database the electronic lessons they have developed. At the end of each unit each teacher prepares an electronic test. In it there are described the evaluation criteria depending on the number of points the student has gathered through correct responses. In most cases we notice that in the teachers' network files with the responses of the tests are added later on. Not always the means for defence offered by the system administrators at the school can guarantee the safety of our files and more exactly the manipulation of the answers of the electronic forms of check up. Aiming at more effective defence of the text files, this article views an algorithm created by us for cryptographic defence of text files and it's application in secondary school. The effective use of cryptographic information defence minimises the opportunity to decipher the coded information aiming at its misuse by the learners. Providing safe defence against unsanctioned access in computer communication is a complex and extensive task which is solved by means of a set of measures of organisation and programme-technical character. The defence of the process of submitting data requires utmost attention because it concerns the most vulnerable and accessible for violation points in the communication systems.


Author(s):  
James Meffan

This chapter discusses the history of multicultural and transnational novels in New Zealand. A novel set in New Zealand will have to deal with questions about cultural access rights on the one hand and cultural coverage on the other. The term ‘transnational novel’ gains its relevance from questions about cultural and national identity, questions that have particularly exercised nations formed from colonial history. The chapter considers novels that demonstrate and respond to perceived deficiencies in wider discourses of cultural and national identity by way of comparison between New Zealand and somewhere else. These include Amelia Batistich's Another Mountain, Another Song (1981), Albert Wendt's Sons for the Return Home (1973) and Black Rainbow (1992), James McNeish's Penelope's Island (1990), Stephanie Johnson's The Heart's Wild Surf (2003), and Lloyd Jones's Mister Pip (2006).


Energies ◽  
2021 ◽  
Vol 14 (5) ◽  
pp. 1463
Author(s):  
Kwami Senam A. Sedzro ◽  
Kelsey Horowitz ◽  
Akshay K. Jain ◽  
Fei Ding ◽  
Bryan Palmintier ◽  
...  

With the increasing share of distributed energy resources on the electric grid, utility companies are facing significant decisions about infrastructure upgrades. An alternative to extensive and capital-intensive upgrades is to offer non-firm interconnection opportunities to distributed generators, via a coordinated operation of utility scale resources. This paper introduces a novel flexible interconnection option based on the last-in, first-out principles of access aimed at minimizing the unnecessary non-firm generation energy curtailment by balancing access rights and contribution to thermal overloads. Although we focus on solar photovoltaic (PV) plants in this work, the introduced flexible interconnection option applies to any distributed generation technology. The curtailment risk of individual non-firm PV units is evaluated across a range of PV penetration levels in a yearlong quasi-static time-series simulation on a real-world feeder. The results show the importance of the size of the curtailment zone in the curtailment risk distribution among flexible generation units as well as that of the “access right” defined by the order in which PV units connect to the grid. Case study results reveal that, with a proper selection of curtailment radius, utilities can reduce the total curtailment of flexible PV resources by up to more than 45%. Findings show that non-firm PV generators can effectively avoid all thermal limit-related upgrade costs.


2002 ◽  
Vol 37 (11) ◽  
pp. 359-372 ◽  
Author(s):  
Larry Koved ◽  
Marco Pistoia ◽  
Aaron Kershenbaum
Keyword(s):  

Marine Policy ◽  
2021 ◽  
Vol 130 ◽  
pp. 104581
Author(s):  
Nathan J. Bennett ◽  
Natalie C. Ban ◽  
Anna Schuhbauer ◽  
Dacotah-Victoria Splichalova ◽  
Megan Eadie ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document