Search results for " Justice"
showing 10 items of 1145 documents
IL BENE DELLA DIGNITÀ UMANA IN SOCCORSO DELLA LEGGE MERLIN? : SULLA SENTENZA 141/2019 DELLA CORTE COSTITUZIONALE IN MATERIA DI FAVOREGGIAMENTO E RECL…
2019
Con la sentenza 141/2019 la Corte costituzionale ha dichiarato non fondata la questione di legittimità costituzionale dei reati di “reclutamento” e di “favoreggiamento” della prostituzione, proposta dalla Corte d’Appello di Bari. A partire dalla vicenda oggetto di giudizio, e dopo una preliminare indagine sui modelli di regolamentazione normativa della prostituzione volontaria e sui dubbi di legittimità costituzionale espressi dalla ordinanza di remissione, ci si sofferma su taluni aspetti critici della decisione. Nella prospettiva dell’Autore, la scelta di prostituirsi ha una inscindibile doppia natura (sessuale ed economica) e dunque una plurima copertura costituzionale; discutibili sono …
Removing the saturation assumption in Bank-Weiser error estimator analysis in dimension three
2020
International audience; We provide a new argument proving the reliability of the Bank-Weiser estimator for Lagrange piecewise linear finite elements in both dimension two and three. The extension to dimension three constitutes the main novelty of our study. In addition, we present a numerical comparison of the Bank-Weiser and residual estimators for a three-dimensional test case.
Promotion et Développement d'un Master Erasmus Mundus - L'Exemple du VIBOT
2011
Cet article decrit l’offre de formation a l’internationale proposee au Centre Universitaire Condorcet du Creusot (Universite de Bourgogne) dans le domaine de la vision par ordinateur et de la robotique. Il presente l’organisation particuliere de ces formations et les actions de support mises en place pour en assurer la perennite.
Social vulnerability to climate policies: Building a matrix to assess policy impacts on well-being
2021
In this article, we address the social vulnerability of people to climate mitigation policies and contribute to assessing the social impacts of climate policies by introducing a matrix tool for conducting vulnerability assessments and participatory climate policy planning. The matrix serves as a methodological tool for identifying social groups in their social spaces. First, we lay the foundation for the matrix by linking social vulnerability to equality and justice, demonstrating the importance of addressing social vulnerability in climate policy design and research. Next, we introduce the ways in which social vulnerability has been addressed in the integration of social and climate policy…
Hyperparasitoids exploit herbivore-induced plant volatiles during host location to assess host quality and non-host identity
2019
Although consumers often rely on chemical information to optimize their foraging strategies, it is poorly understood how top carnivores above the third trophic level find resources in heterogeneous environments. Hyperparasitoids are a common group of organisms in the fourth trophic level that lay their eggs in or on the body of other parasitoid hosts. Such top carnivores use herbivore-induced plant volatiles (HIPVs) to find caterpillars containing parasitoid host larvae. Hyperparasitoids forage in complex environments where hosts of different quality may be present alongside non-host parasitoid species, each of which can develop in multiple herbivore species. Because both the identity of th…
Opinions 100, 101 and 102
2020
The International Committee on Systematics of Prokaryotes has formally made final decisions, taking into account the conclusions of the Judicial Commission, on three pending Requests for an Opinion, thereby allowing the corresponding Opinions to be issued. According to Opinion 100, the request for the recognition of strain A1-86 (=DSM 17629=NCIMB 14373) as the neotype strain of Eubacterium rectale (Hauduroy et al. 1937) Prévot 1938 (Approved Lists 1980) is denied, ruling that a neotype does not need to be designated for E. rectale because strain VPI 0990 (=ATCC 33656=CIP 105953) is considered to be a duplicate isolate of the same strain as VPI 0989 (=ATCC 25578) and may serve as its nomencl…
Embracing diverse worldviews to share planet Earth
2019
Leading societies toward a more sustainable, equitably shared, and environmentally just future requires elevating and strengthening conversations on the nonmaterial and perhaps unquantifiable values of nonhuman nature to humanity. Debates among conservationists relating to the appropriateness of valuing ecosystems in terms of their human utility have eclipsed the more important and impactful task of expressing conservation concerns in terms that are meaningful to diverse stakeholders. We considered the wide global diversity of perspectives on the biosocial complex-the relationships and interactions between all living species on Earth-and argue that humanity's best chance for effective conse…
Konforme Abbildung und Greensche Funktion
1949
Mit Hilfe des Additionstheorems Gl. (I, 31) und mit Hilfe der imaginaren Transformation von Jacobi Gl. (I, 33) folgt fur die durch die Funktion λ = sn (z, k) vermittelte, Abbildung der z-Ebene auf die λ-Ebene $$\lambda = {\lambda _1} + i{\lambda _2} = snz = sn\left( {x + iy} \right) = \frac{{snxcniydniy + sniycnxdnx}}{{1 - {k^2}s{n^2}xs{n^2}iy}}$$ .
Ultimate strength of quasi-isotropic laminates in tension: theoretical and experimental analysis
2020
International audience; no abstract
Robust link prediction in criminal networks: A case study of the Sicilian Mafia
2020
Abstract Link prediction exercises may prove particularly challenging with noisy and incomplete networks, such as criminal networks. Also, the link prediction effectiveness may vary across different relations within a social group. We address these issues by assessing the performance of different link prediction algorithms on a mafia organization. The analysis relies on an original dataset manually extracted from the judicial documents of operation “Montagna”, conducted by the Italian law enforcement agencies against individuals affiliated with the Sicilian Mafia. To run our analysis, we extracted two networks: one including meetings and one recording telephone calls among suspects, respect…