8,343 research outputs found
Recommended from our members
Trafficking in Persons: U.S. Policy and Issues for Congress
[Excerpt] This report focuses on international and domestic human trafficking and U.S. policy responses, with particular emphasis on the TVPA and its subsequent reauthorizations. The report begins with a description of key TIP-related definitions and an overview of the human trafficking problem. It follows with an overview of major foreign policy responses to international human trafficking. The report then focuses on responses to trafficking into and within the United States, examining relief for trafficking victims in the United States and discussing U.S. law enforcement efforts to combat domestic trafficking. The report concludes with an overview of current anti-trafficking legislation and an analysis of policy issues
Recommended from our members
Border Security: Understanding Threats at U.S. Borders
[Excerpt] The United States confronts a wide array of threats at U.S. borders, ranging from terrorists who may have weapons of mass destruction, to transnational criminals smuggling drugs or counterfeit goods, to unauthorized migrants intending to live and work in the United States. Given this diversity of threats, how may Congress and the Department of Homeland Security (DHS) set border security priorities and allocate scarce enforcement resources?
In general, DHS’s answer to this question is organized around risk management, a process that involves risk assessment and the allocation of resources based on a cost-benefit analysis. This report focuses on the first part of this process by identifying border threats and describing a framework for understanding risks at U.S. borders. DHS employs models to classify threats as relatively high- or low-risk for certain planning and budgeting exercises and to implement certain border security programs. Members of Congress may wish to use similar models to evaluate the costs and benefits of potential border security policies and to allocate border enforcement resources. This report discusses some of the issues involved in modeling border-related threats
Indexed induction and coinduction, fibrationally.
This paper extends the fibrational approach to induction and coinduction pioneered by Hermida and Jacobs, and developed by the current authors, in two key directions. First, we present a sound coinduction rule for any data type arising as the final coalgebra of a functor, thus relaxing Hermida and Jacobs’ restriction to polynomial data types. For this we introduce the notion of a quotient category with equality (QCE), which both abstracts the standard notion of a fibration of relations constructed from a given fibration, and plays a role in the theory of coinduction dual to that of a comprehension category with unit (CCU) in the theory of induction. Second, we show that indexed inductive and coinductive types also admit sound induction and coinduction rules. Indexed data types often arise as initial algebras and final coalgebras of functors on slice categories, so our key technical results give sufficent conditions under which we can construct, from a CCU (QCE) U : E -> B, a fibration with base B/I that models indexing by I and is also a CCU (QCE)
Polysemy and Co-predication
Many word forms in natural language are polysemous, but only some of them allow for co-predication, that is, they allow for simultaneous predications selecting for two different meanings or senses of a nominal in a sentence. In this paper, we try to explain (i) why some groups of senses allow co-predication and others do not, and (ii) how we interpret co-predicative sentences. The paper focuses on those groups of senses that allow co-predication in an especially robust and stable way. We argue, using these cases, but focusing particularly on the multiply polysemous word ‘school’, that the senses involved in co-predication form especially robust activation packages, which allow hearers and readers to access all the different senses in interpretation
Isolating LCDs at end-of-life using active disassembly technology: A feasibility study
The European Union draft Waste Electrical and Electronic Equipment (WEEE) directive calls for the removal and separate treatment of liquid crystal displays (LCD). This aspect of the legislation will potentially have an important impact upon the future `End of Life' (EoL) processing of much WEEE. Active Disassembly using Smart Materials (ADSM) has been proven to have applicability in self-dismantling, nondestructive and rapid disassembly of small electronic products. This paper investigates the technical feasibility of removing LCD screens from IT communication products using ASDM technology. In this paper an option is suggested to cleanly separate LCD screens from printed circuit boards, utilizing an LCD bracket made from `shape memory polymer'. The case study products employed are Nokia Japanese J-Phones. Demonstration experiments with initial results are presented, and future developments discussed. SMB glass transformation temperatures (Tg) and time efficiency in disassembly are considered
Kant and the Ontological Argument
An essay reaffirming Kant's criticism of the ontological argument for the existence of God – a conjecture conceived in the 11th century by Anselm of Canterbury and defended in the mid-20th century by Charles Hartshorne and Norman Malcolm
Higher Order Containers
Abstract. Containers are a semantic way to talk about strictly positive types. In previous work it was shown that containers are closed under various constructions including products, coproducts, initial algebras and terminal coalgebras. In the present paper we show that, surprisingly, the category of containers is cartesian closed, giving rise to a full cartesian closed subcategory of endofunctors. The result has interesting applications syntax. We also show that while the category of containers has finite limits, it is not locally cartesian closed.
- …