Search results for: crime scene behviours
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 702

Search results for: crime scene behviours

282 A Comparative Analysis of the Role, Representations and Architectural Identity of Public Space in Medieval and Contemporary Cairo

Authors: Muhammad Feteha

Abstract:

The socio-political Middle East scene has radically changed over the last decade, and one major contributor to this change was the Egyptian revolution of 2011. The massive impact of this revolution that originally started as a small protest in the Tahrir square has attracted more scholars to study the public space in Egypt, where it has become a necessity in order to understand and improve the socio-political conditions. The status of public space in Egypt has been deteriorating due to many reasons, including privatization and neglect. This paper studies one of the major problems of the contemporary public space in Cairo, which is the lack of identity. This takes place through a comparative analysis between selected case studies from both medieval and contemporary Cairo. The theoretical framework upon which the analysis is based views public space as a ‘container of social action’ and a ‘product of spatial practice’. Through the ‘deciphering of space’, differences in the socio-political role, symbolism, and identity of public spaces between both eras are shown. The paper aims to extract some lessons from public space in medieval Cairo, which was truly the ‘centerpiece of the public realm’ and a ‘fundamental expressions’ of the unique trans-dynastic architectural identity of Cairo. In addition, it suggests some strategies to revive the Cairene identity of public space instead of constructing new ones to be only ‘utilitarian spaces used for circulation’ and lack any identity.

Keywords: architectural identity, Cairene public space, Islamic architectural history, production of space

Procedia PDF Downloads 193
281 Large-Capacity Image Information Reduction Based on Single-Cue Saliency Map for Retinal Prosthesis System

Authors: Yili Chen, Xiaokun Liang, Zhicheng Zhang, Yaoqin Xie

Abstract:

In an effort to restore visual perception in retinal diseases, an electronic retinal prosthesis with thousands of electrodes has been developed. The image processing strategies of retinal prosthesis system converts the original images from the camera to the stimulus pattern which can be interpreted by the brain. Practically, the original images are with more high resolution (256x256) than that of the stimulus pattern (such as 25x25), which causes a technical image processing challenge to do large-capacity image information reduction. In this paper, we focus on developing an efficient image processing stimulus pattern extraction algorithm by using a single cue saliency map for extracting salient objects in the image with an optimal trimming threshold. Experimental results showed that the proposed stimulus pattern extraction algorithm performs quite well for different scenes in terms of the stimulus pattern. In the algorithm performance experiment, our proposed SCSPE algorithm have almost five times of the score compared with Boyle’s algorithm. Through experiment s we suggested that when there are salient objects in the scene (such as the blind meet people or talking with people), the trimming threshold should be set around 0.4max, in other situations, the trimming threshold values can be set between 0.2max-0.4max to give the satisfied stimulus pattern.

Keywords: retinal prosthesis, image processing, region of interest, saliency map, trimming threshold selection

Procedia PDF Downloads 248
280 The Evolution of Online Hate: How Decades of Tactical and Technological Innovation Created a Hate Epidemic

Authors: Kashvi Jain, Adam Burston

Abstract:

Right-wing social movements are a dominant force in American politics, as evidenced by the January 6th Insurrection, the prevalence of extremist conspiracy theories, and a nationwide surge in hate crime. Despite an abundance of scholarship on contemporary right-wing extremism, there is little scholarship that explains their rise. This paper examines how the white power movement developed through tactical innovation and strategic use of increasingly powerful digital technologies. Using qualitative content analysis of archived digital bulletin boards and websites, we examine right-wing extremists’ digital communication during three consequential time periods of tactical and technological innovation: pre-internet (1980s), web 1.0 (1990s), and web 2.0 (2000s). Our analysis suggests that right-wing activists innovatively exploited the features and affordances of digital technologies and their knowledge of free speech rights to spread supremacist collective identity and ideology. Beyond our empirical contribution, we offer policy advice that school administrators can employ to limit hate.

Keywords: leaderless resistance, technological affordances, anti-defamation league, white power movement, tactical

Procedia PDF Downloads 69
279 Pyramidal Lucas-Kanade Optical Flow Based Moving Object Detection in Dynamic Scenes

Authors: Hyojin Lim, Cuong Nguyen Khac, Yeongyu Choi, Ho-Youl Jung

Abstract:

In this paper, we propose a simple moving object detection, which is based on motion vectors obtained from pyramidal Lucas-Kanade optical flow. The proposed method detects moving objects such as pedestrians, the other vehicles and some obstacles at the front-side of the host vehicle, and it can provide the warning to the driver. Motion vectors are obtained by using pyramidal Lucas-Kanade optical flow, and some outliers are eliminated by comparing the amplitude of each vector with the pre-defined threshold value. The background model is obtained by calculating the mean and the variance of the amplitude of recent motion vectors in the rectangular shaped local region called the cell. The model is applied as the reference to classify motion vectors of moving objects and those of background. Motion vectors are clustered to rectangular regions by using the unsupervised clustering K-means algorithm. Labeling method is applied to label groups which is close to each other, using by distance between each center points of rectangular. Through the simulations tested on four kinds of scenarios such as approaching motorbike, vehicle, and pedestrians to host vehicle, we prove that the proposed is simple but efficient for moving object detection in parking lots.

Keywords: moving object detection, dynamic scene, optical flow, pyramidal optical flow

Procedia PDF Downloads 350
278 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security

Authors: Irfan U. Din

Abstract:

The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.

Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)

Procedia PDF Downloads 290
277 Evidences for Better Recall with Compatible Items in Episodic Memory

Authors: X. Laurent, M. A. Estevez, P. Mari-Beffa

Abstract:

A focus of recent research is to understand the role of our own response goals in the selection of information that will be encoded in episodic memory. For example, if we respond to a target in the presence of distractors, an important aspect under study is whether the distractor and the target share a common response (compatible) or not (incompatible). Some studies have found that compatible objects tend to be groups together and stored in episodic memory, whereas others found that targets in the presence of incompatible distractors are remembered better. Our current research seems to support both views. We used a Tulving-based definition of episodic memory to differentiate memory from episodic and non-episodic traces. In this task, participants first had to classify a blue object as human or animal (target) which appeared in the presence of a green one (distractor) that could belong to the same category of the target (compatible), to the opposite (incompatible) or to an irrelevant one (neutral). Later they had to report the identity (What), location (Where) and time (When) of both target objects (which had been previously responded to) and distractors (which had been ignored). Episodic memory was inferred when the three scene properties (identity, location and time) were correct. The measure of non-episodic memory consisted of those trials in which the identity was correctly remembered, but not the location or time. Our results showed that episodic memory for compatible stimuli is significantly superior to incompatible ones. In sharp contrast, non-episodic measures found superior memory for targets in the presence of incompatible distractors. Our results demonstrate that response compatibility affects the encoding of episodic and non-episodic memory traces in different ways.

Keywords: episodic memory, action systems, compatible response, what-where-when task

Procedia PDF Downloads 176
276 The Impact of Political Satire on the Balance of Political Powers in Egypt: The Case of El-Bernameg in Egypt

Authors: Sally Barsoum

Abstract:

This paper is providing a significant insight into the role of satire in Egyptian politics and how it has been received from the government and viewer’s point of view. It mainly sets out to test whether Bassem Youssef’s satirical program has played a significant role in Egypt recent politics and to investigate what is the nature and extent of this role. In order to test this hypothesis, the researcher chose to critically analyze one episode of Bassem Youssef’s satirical show, El Bernameg. This paper goes further to highlight that the aims of satire is to invite citizens to analyze, criticize and question people in power and the realm of politics rather than remain as untouched subjects by combining humor with critique in order to enhance citizens’ political awareness and perhaps even political engagement. Moreover it identifies that Bassem Youssef’s satire is to use laughter as a medium to communicate his political message. By first informing the public and secondly engaging them through laughter, satire plays a very constructive political role, which have been argued finally that Bassem Youssef has indeed played an important part in the Egyptian political scene of today and this can be measured by the degree of censorship that he has been subject to and the level of international and domestic reaction towards his satirical show. At the end, this paper is suggesting that the measure of a strong government is its ability not only to accommodate satire but also to learn from it.

Keywords: political satirist, Bassem Youssef, capital broadcasting center, TV channel, muslims brotherhood regime, ONTV Egyptian TV channel

Procedia PDF Downloads 323
275 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 330
274 July 15 Coup Attempt and the Use of New Communication Technologies

Authors: Yasemin Gulsen Yilmaz, Suleyman Hakan Yilmaz, Muhammet Erbay

Abstract:

The new communication technologies have gradually improved its efficiency in all fields of life and made its presence irreplaceable. These technologies which appear in every aspect of life differently showed itself during the failed coup attempt in Turkey too. The evening of July 15, 2016, have already taken its place in the Turkish political history. In the evening of July 15, Turkish nation confronted to a coup attempted by a group within the Turkish Armed Forces. That evening, the scene of the confrontation between the coup attempters and the resisting civilians were watched minute-by-minute by the people using the new communication technologies. Pro-coup soldiers and the resisting groups that came face to face in the streets of metropolitan cities, made their in-group communications by using new media tools very actively. New media turned into the most important weapon both for coup plotters and for those who resisted. In the morning of next day, whoever used these tools better had the upper hand. The civilians were successful in protecting democracy not only by resisting against tanks and bullets but also by following the internet, organising in social media, sharing information-photos on the net and telling large masses their experiences through these technologies. In this study, we focused on and analysed the use of new media both by coup soldiers and resisting civilians during the failed coup attempt in July 15. Within the scope of this study, coup attempt news that took place in printed media within one week were examined; the information about the use of new media tools during the night of failed coup were compiled; and it was determined how, to what extend and what for these tools were used and how effective they were.

Keywords: communication, July 15, new media, media

Procedia PDF Downloads 246
273 A Retrospective Study of Suicidal Deaths in Madinah for Ten Years

Authors: Radah Yousuf, Ashraf Shebl

Abstract:

Suicide is a tragic event with strong emotional repercussions for its survivors and for families of its victims. There were thousands of cases all over the world. There are many risk factors include mental disorders such as depression, and substance abuse, including alcoholism and use of benzodiazepines. Other suicides are impulsive acts due to stress such as from financial difficulties, troubles with relationships, or from bullying. The aim of work in this study is making a survey from archives of the suicidal cases, which had a medicolegal examination, in forensic medicine center in Al Madinah Almunawarah-KSA, for ten years in the period between 1428-1438h. In each case, some data are collected such as age, sex, time and place of an act, method of suicide, the presence of the witness, medical history. This study demonstrates that suicide is more common in male than female, and the 4th decade was the most period of age. The most common method of suicide was hanging followed by falling from the height. These results indicated that cultural and religious beliefs that discourage suicide and support self-preservation instinct, and suicide education programs provide information to students in high school, builds awareness, one of the most important issues in solving that problem. From the forensic view, circumstantial evidence of every forensic case must take and record, full history about the social, medical and psychological problems, attend the scene of death is a very important, complete medicolegal investigation for every case, and full autopsy with very skilled techniques and facilities can help in diagnosing what type of crimes.

Keywords: suicide, age, sex, hanging

Procedia PDF Downloads 149
272 Localization of Buried People Using Received Signal Strength Indication Measurement of Wireless Sensor

Authors: Feng Tao, Han Ye, Shaoyi Liao

Abstract:

City constructions collapse after earthquake and people will be buried under ruins. Search and rescue should be conducted as soon as possible to save them. Therefore, according to the complicated environment, irregular aftershocks and rescue allow of no delay, a kind of target localization method based on RSSI (Received Signal Strength Indication) is proposed in this article. The target localization technology based on RSSI with the features of low cost and low complexity has been widely applied to nodes localization in WSN (Wireless Sensor Networks). Based on the theory of RSSI transmission and the environment impact to RSSI, this article conducts the experiments in five scenes, and multiple filtering algorithms are applied to original RSSI value in order to establish the signal propagation model with minimum test error respectively. Target location can be calculated from the distance, which can be estimated from signal propagation model, through improved centroid algorithm. Result shows that the localization technology based on RSSI is suitable for large-scale nodes localization. Among filtering algorithms, mixed filtering algorithm (average of average, median and Gaussian filtering) performs better than any other single filtering algorithm, and by using the signal propagation model, the minimum error of distance between known nodes and target node in the five scene is about 3.06m.

Keywords: signal propagation model, centroid algorithm, localization, mixed filtering, RSSI

Procedia PDF Downloads 301
271 An Evaluation of Neural Network Efficacies for Image Recognition on Edge-AI Computer Vision Platform

Authors: Jie Zhao, Meng Su

Abstract:

Image recognition, as one of the most critical technologies in computer vision, works to help machine-like robotics understand a scene, that is, if deployed appropriately, will trigger the revolution in remote sensing and industry automation. With the developments of AI technologies, there are many prevailing and sophisticated neural networks as technologies developed for image recognition. However, computer vision platforms as hardware, supporting neural networks for image recognition, as crucial as the neural network technologies, need to be more congruently addressed as the research subjects. In contrast, different computer vision platforms are deterministic to leverage the performance of different neural networks for recognition. In this paper, three different computer vision platforms – Jetson Nano(with 4GB), a standalone laptop(with RTX 3000s, using CUDA), and Google Colab (web-based, using GPU) are explored and four prominent neural network architectures (including AlexNet, VGG(16/19), GoogleNet, and ResNet(18/34/50)), are investigated. In the context of pairwise usage between different computer vision platforms and distinctive neural networks, with the merits of recognition accuracy and time efficiency, the performances are evaluated. In the case study using public imageNets, our findings provide a nuanced perspective on optimizing image recognition tasks across Edge-AI platforms, offering guidance on selecting appropriate neural network structures to maximize performance under hardware constraints.

Keywords: alexNet, VGG, googleNet, resNet, Jetson nano, CUDA, COCO-NET, cifar10, imageNet large scale visual recognition challenge (ILSVRC), google colab

Procedia PDF Downloads 92
270 Reconfigurable Device for 3D Visualization of Three Dimensional Surfaces

Authors: Robson da C. Santos, Carlos Henrique de A. S. P. Coutinho, Lucas Moreira Dias, Gerson Gomes Cunha

Abstract:

The article refers to the development of an augmented reality 3D display, through the control of servo motors and projection of image with aid of video projector on the model. Augmented Reality is a branch that explores multiple approaches to increase real-world view by viewing additional information along with the real scene. The article presents the broad use of electrical, electronic, mechanical and industrial automation for geospatial visualizations, applications in mathematical models with the visualization of functions and 3D surface graphics and volumetric rendering that are currently seen in 2D layers. Application as a 3D display for representation and visualization of Digital Terrain Model (DTM) and Digital Surface Models (DSM), where it can be applied in the identification of canyons in the marine area of the Campos Basin, Rio de Janeiro, Brazil. The same can execute visualization of regions subject to landslides, as in Serra do Mar - Agra dos Reis and Serranas cities both in the State of Rio de Janeiro. From the foregoing, loss of human life and leakage of oil from pipelines buried in these regions may be anticipated in advance. The physical design consists of a table consisting of a 9 x 16 matrix of servo motors, totalizing 144 servos, a mesh is used on the servo motors for visualization of the models projected by a retro projector. Each model for by an image pre-processing, is sent to a server to be converted and viewed from a software developed in C # Programming Language.

Keywords: visualization, 3D models, servo motors, C# programming language

Procedia PDF Downloads 342
269 Psychotraumatology: The Relationship Between Posttraumatic Stress Disorder and Criminal Justice Involvement in Vietnam War Veterans

Authors: Danielle Page

Abstract:

Foregoing studies, statistics, and medical evaluations have established a relationship between Posttraumatic stress disorder (PTSD) and criminal justice involvement in Vietnam veterans. War is highly trauma inducing and can leave combat veterans with mental disorders ranging from psychopathic thoughts to suicidal ideation. The majority of those suffering are unaware that they have PTSD, and as a coping mechanism, they often turn to self isolation. Beyond isolation, many veterans with symptomatic PTSD turn to aggression and substance abuse to cope with their internal agony. The most common crimes committed by veterans with PTSD fall into the assault and drug/alcohol abuse categories. Thus, a relationship is established between veteran populations and the criminal justice system. This dissertation aims to define the relationship between PTSD and criminal justice involvement in veterans, explore the mediating factors in this relationship, and analyze numerous court cases in this subject area. Further, it will examine the ways in which crime rates can be reduced for veterans with symptoms of PTSD. This ranges from the improvement of healthcare systems to the implementation of special courts to handle veteran cases.

Keywords: psychotraumatology, forensic psychology, PTSD, vietnam veterans

Procedia PDF Downloads 82
268 The Evaluation and Assessment of Modernism

Authors: Mohammad Mirzaei

Abstract:

The term "modernism" is at the heart of debates about 20th-century literature and critical theory. Astradur Eysteinsson argues here that the notion of modernity does not emerge directly from the literature it encompasses but is actually a product of critical practices related to non-traditional literature. By intervening in and relating them to modernist works and contemporary literary theories, Esteinsson takes a comprehensive look at the idea of modernity. Eysteinsson critically examines various expressions of modernism in the rich spectrum of American, British, and European literature, criticism, and theory. He first explored a number of modernist paradigms and found a conflict between modernism's potential for cultural subversion and its relatively conservative status as a formalist project. In turn, he sees these paradigms as interpretations and inventions of literary history. Seen in this way, modernism presents both a historical change in the literary scene and the context of this change. Imbued with the connotations of tradition and modernity, modernity fulfills its primary function. Highlights and defines the complex relationship between history and post-realist literature. Eysteinsson focuses on how concepts of modernism guide our understanding of literature and literary history and how they influence the evaluation of experimental and 3post realist works in literature and art. He discusses in detail the relationship between modernism and the key terms postmodernism, avant-garde, and realism. In staging a crisis of subject and reference, modernity is not a form of discourse but its subversion, the "other" that may reveal important aspects of our social and linguistic experience in Western culture.

Keywords: literature, modernism, western cultures, postmodernism

Procedia PDF Downloads 68
267 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 352
266 Racism in Drug Policies: A Report on United States Legislation

Authors: Frederick Monyepao

Abstract:

Crack cocaine first appeared on the scene in the form of cocaine freebasing in the late 1970s. Stockbrokers, investment bankers, rock stars, Hollywood elites, and a few pro athletes were regular users of the substance. As criminogenic factors associated with substance abuse began to surface, congress passed new legislation. The laws led to the increase of health coverage insurances and the expansion of hospitals. By the mid-1980s, crack use spread into America's inner cities among impoverished African Americans and Latinos. While substance abuse increased among minority communities, legislation pertaining to substance abuse evolved. The prison industry also expanded the number of cells available. A qualitative approach was taken, drawing from a range secondary sources for contextual analysis. This paper traces out the continued marginalisation and racist undertones towards minorities as perpetuated by certain drug policies. It was discovered that the new legislation on crack was instrumental in the largest incarcerations the United States ever faced. Drug offenders increased in prisons eightfold from 1986 to 2000. The paper concludes that American drug control policies are consistently irrational and ineffective when measured by levels of substance use and abuse. On the contrary, these policies have been successful as agents of social control in maintaining the stratification patterns of racial/ethnic minorities and women. To move beyond prohibition, radical law and policy reform may require a change in narratives on substance use.

Keywords: crack, drug policy, minorities, racism, substance abuse

Procedia PDF Downloads 291
265 Benefits of Hybrid Mix in Renewable Energy and Integration with E-Efficient Compositions

Authors: Ahmed Khalil

Abstract:

Increased energy demands around the world have led to the raise in power production which has resulted with more greenhouse gas emissions through fossil sources. These fossil sources and emissions cause deterioration in echo-system. Therefore, renewable energy sources come to the scene as echo-friendly and clean energy sourcing, whereas the electrical devices and energy needs decrease in the timeline. Each of these renewable energy sources contribute to the reduction of greenhouse gases and mitigate environmental deterioration. However, there are also some general and source-specific challenges, which influence the choice of the investors. The most prominent general challenge that effects end-users’ comfort and reliability is usually determined as the intermittence which derives from the diversions of source conditions, due to nature dynamics and uncontrolled periodic changes. Research and development professionals strive to mitigate intermittence challenge through material improvement for each renewable source whereas hybrid source mix stand as a solution. This solution prevails well, when single renewable technologies are upgraded further. On the other hand, integration of energy efficient devices and systems, raise the affirmative effect of such solution in means of less energy requirement in sustainability composition or scenario. This paper provides a glimpse on the advantages of composing renewable source mix versus single usage, with contribution of sampled e-efficient systems and devices. Accordingly it demonstrates the extended benefits, through planning and predictive estimation stages of Ahmadi Town Projects in Kuwait.

Keywords: e-efficient systems, hybrid source, intermittence challenge, renewable energy

Procedia PDF Downloads 136
264 Cable Transport for a Smart City: Between Challenges and Opportunities, Case of the City of Algiers, Algeria

Authors: Ihaddadene Thanina, Haraoubia Imane, Baouni Tahar

Abstract:

Urban mobility is one of the first challenges of cities; it is becoming more and more problematic because it is perceived as the cause of many dysfunctions; it is not only to facilitate accessibility but also to ensure vast benefits. For this reason, several cities in the world have thought about alternatives to smart mobility and sustainable transport. Today, the sustainable city has many cards at its disposal, and a new mode is entering the urban scene: aerial cable transport; it has imposed itself as an effective mode of public transport and a real solution for the future. This electric mobility brings a new dimension, not only to collective daily travel but also to the urban space. It has an excellent capacity to redevelop the public space; it is a catalyst that allows one to appreciate the view from the sky and to discover different large-scale projects that bring an important attractiveness to the city. With regard to the cities in the world which use these systems of transport: Algeria does not escape this reality; it is the country which has the greatest number of devices of urban transport by cable in the world, with installations in many cities such as Tlemcen, Constantine, Blida, Oran, Tizi-Ouzou, Annaba, Skikda. The following study explores the role of cable transport in the transformation of the city of Algiers into a smart city. The methodology used in this work is based on the development of a set of indicators using a questionnaire survey. The main objective of this work is to shed light on cable transport as a key issue in designing the sustainable city of tomorrow, to evaluate its role in the city of Algiers, and its ability to integrate into the urban transport network.

Keywords: Algiers, cable transport, indicators, smart city

Procedia PDF Downloads 114
263 A Preliminary Study of the Effects of Abiotic Environmental Variables on Early Diptera Carrion Colonizers in Algiers, Algeria

Authors: M. Taleb, G. Tail, F. Z. Kara, B. Djedouani T. Moussa

Abstract:

Necrophagous insects usually colonize cadavers within a short time after death. However, they are influenced by weather conditions, and their distribution and activity vary according to different time scales, which can affect the post-mortem interval (PMI) estimation. As no data have been published in Algeria on necrophagous insects visiting corpses, two field surveys were conducted in July 2012 and March 2013 at the National Institute for Criminalistics and Criminology (INCC) using rabbit carcasses (Oryctolagus cuniculus L.). The trials were designed to identify the necrophagous Diptera fauna of Algiers, Algeria and examine their variations according to environmental variables. Four hundred and eighteen Diptera adults belonging to five families were captured during this study. The species which were identified on human corpses in different regions of Algeria were also observed on the rabbit carcasses. Although seasonal variations of the species were observed, their abundance did not significantly vary between the two seasons. In addition to seasonal effects, the ambient temperature, the wind speed, and precipitation affect the number of trapped flies. These conclusions highlight the necessity of considering the environmental factors at a scene to estimate the post-mortem interval accurately. It is hoped that these findings provide basic information regarding the necrophagous Diptera fauna of Algeria.

Keywords: forensic entomology, necrophagous diptera, post-mortem interval, abiotic factors, Algeria

Procedia PDF Downloads 390
262 Sustainability Enhancement of Pedestrian Space Quality in Old Communities from the Perspective of Inclusiveness:Taking Cao Yang New Village, Shanghai as an Example

Authors: Feng Zisu

Abstract:

Community is the basic unit of the city, community pedestrian space is also an important part of the urban public space, and its quality improvement is also closely related to the residents' happiness and sense of belonging. Domestic and international research perspectives on community pedestrian space have gradually changed to inclusive design for the whole population, paying more attention to the equitable accessibility of urban space and the multiple composite enhancement of spatial connotation. In order to realize the inclusive and sustainable development of pedestrian space in old communities, this article selects Cao Yang New Village in Shanghai as a practice case, and based on the connotation of inclusiveness, the four dimensions of space, traffic, function and emotion are selected as the layers of inclusive connotation of pedestrian space in old communities. This article identifies the objective social needs, dynamic activity characteristics and subjective feelings of multiple subjects, and reconstructs the structural hierarchy of “spatial perception - behavioral characteristics - subjective feelings” of walking. It also proposes a governance strategy of “reconfiguring the pedestrian network, optimizing street quality, integrating ecological space and reshaping the community scene” from the aspects of quality of physical environment and quality of behavioral perception, aiming to provide new ideas for promoting the inclusive and sustainable development of pedestrian space in old communities.

Keywords: inclusivity, old community, pedestrian space, spatial quality, sustainable renovation

Procedia PDF Downloads 37
261 Arboretum: Community Mixed Reality Nature Environment

Authors: Radek Richtr, Petr Paus

Abstract:

The connection to the primal environment, living and growing nature is disappearing for most of the residents in urban core areas nowadays. Most of the residents perceive scattered green mass like more technical objects than sentient living organisms. The Arboretum is a type of application from the 'serious games' genre -it is a research experiment masked as a gaming environment. In used virtual and augmented reality environments, every city district is represented by central objects; Pillars created as a result of resident’s consensus. Every player can furthermore plant and grow virtual organic seeds everywhere he wants. Seeds sprout, and their form is determined by both players’ choice and nearest pillar. Every house, private rooms, and even workspace get their new living virtual avatar-connected 'residents' growing from player-planted seeds. Every room or workspace is transformed into (calming) nature scene, reflecting in some way both players and community spirit and together create a vicinity environment. The conceptual design phase of the project is crucial and allows for the identification of the fundamental problems through abstraction. The project that centers on wide community usage needs a clear and accessible interface. Simultaneously the conceptual design allows early sharing of project ideas and creating public concern. The paper discusses the current conceptual model of an Arboretum project (which is part of a whole widespread project) and its validation.

Keywords: augmented reality, conceptual design, mixed reality, social engineering

Procedia PDF Downloads 231
260 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 92
259 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method

Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López

Abstract:

The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.

Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people

Procedia PDF Downloads 129
258 Water Body Detection and Estimation from Landsat Satellite Images Using Deep Learning

Authors: M. Devaki, K. B. Jayanthi

Abstract:

The identification of water bodies from satellite images has recently received a great deal of attention. Different methods have been developed to distinguish water bodies from various satellite images that vary in terms of time and space. Urban water identification issues body manifests in numerous applications with a great deal of certainty. There has been a sharp rise in the usage of satellite images to map natural resources, including urban water bodies and forests, during the past several years. This is because water and forest resources depend on each other so heavily that ongoing monitoring of both is essential to their sustainable management. The relevant elements from satellite pictures have been chosen using a variety of techniques, including machine learning. Then, a convolution neural network (CNN) architecture is created that can identify a superpixel as either one of two classes, one that includes water or doesn't from input data in a complex metropolitan scene. The deep learning technique, CNN, has advanced tremendously in a variety of visual-related tasks. CNN can improve classification performance by reducing the spectral-spatial regularities of the input data and extracting deep features hierarchically from raw pictures. Calculate the water body using the satellite image's resolution. Experimental results demonstrate that the suggested method outperformed conventional approaches in terms of water extraction accuracy from remote-sensing images, with an average overall accuracy of 97%.

Keywords: water body, Deep learning, satellite images, convolution neural network

Procedia PDF Downloads 90
257 Muddle Effort for Organized Crime in India: Social Work Concern for Anti Human Trafficking Unit

Authors: Rajkamal Ajmeri, Leena Mehta

Abstract:

Growing magnitude of human trafficking is the indicatory symptom of ill society. Despite of many treaties, legislation and protocols control over human trafficking require additional attention. However, many Anti Human Trafficking Units (AHTU) are working throughout India but it is a fact that incidence pertaining to illegal human trade is not fully under control. Social work as discipline and practice base profession has a lot of concern about situation and the trafficked victims. United state put Indian in tier II watch list because they are not fully complying with the minimum standard of Trafficking Victims Protection laws but they are making a significant effort to bring themselves into compliance with those standards. In order to solve the issue, scientific research of experiences and opinions of government / non government machineries can play an effective role in raising the standard legislation for trafficked victims. Proper study can enhance understanding on various problems faced by government machineries. The study can help in developing the scientific model, which can effectively solve the problem in human trafficking field.

Keywords: human trafficking, legislations, victims, social work, government machinery

Procedia PDF Downloads 298
256 Monocular Depth Estimation Benchmarking with Thermal Dataset

Authors: Ali Akyar, Osman Serdar Gedik

Abstract:

Depth estimation is a challenging computer vision task that involves estimating the distance between objects in a scene and the camera. It predicts how far each pixel in the 2D image is from the capturing point. There are some important Monocular Depth Estimation (MDE) studies that are based on Vision Transformers (ViT). We benchmark three major studies. The first work aims to build a simple and powerful foundation model that deals with any images under any condition. The second work proposes a method by mixing multiple datasets during training and a robust training objective. The third work combines generalization performance and state-of-the-art results on specific datasets. Although there are studies with thermal images too, we wanted to benchmark these three non-thermal, state-of-the-art studies with a hybrid image dataset which is taken by Multi-Spectral Dynamic Imaging (MSX) technology. MSX technology produces detailed thermal images by bringing together the thermal and visual spectrums. Using this technology, our dataset images are not blur and poorly detailed as the normal thermal images. On the other hand, they are not taken at the perfect light conditions as RGB images. We compared three methods under test with our thermal dataset which was not done before. Additionally, we propose an image enhancement deep learning model for thermal data. This model helps extract the features required for monocular depth estimation. The experimental results demonstrate that, after using our proposed model, the performance of these three methods under test increased significantly for thermal image depth prediction.

Keywords: monocular depth estimation, thermal dataset, benchmarking, vision transformers

Procedia PDF Downloads 34
255 A Progressive Techno-Legal Framework for Digital Evidence Management

Authors: Ayobami P. Olatunji, Saadat Ibiyeye, Abdulaziz Ibiyeye, Tahir M. Khan

Abstract:

Digital evidence has become a cornerstone in criminal investigations due to the vast amount of information available in digital form. Despite its prevalence, this evidence is often met with skepticism in court proceedings because of its inherently volatile nature. Traditional forensic processes, defined predominantly by technology experts, emphasize technical details in evidence collection while often neglecting legal procedures. This gap can pose significant challenges for legal practitioners in understanding and applying digital forensics. As digital evidence increasingly influences future cases, a cohesive framework integrating both technical and legal perspectives is essential. We propose a comprehensive techno-legal framework designed to bridge this gap. Our framework integrates key aspects of collection, preservation, examination, and documentation with legal components such as case building, certificate of compliance, cross-examination, and authorization. This balanced approach aims not to replace existing evidence presentation principles but to enhance the seamless integration of digital evidence into legal proceedings, addressing the common issues that lead to its dismissal.

Keywords: evidence presentation, warrant, digital-forensic, certificate of compliance, legal procedures, computer crime, violation, investigation cybercrime

Procedia PDF Downloads 34
254 Convergence of Media in New Era

Authors: Mohamad Reza Asariha

Abstract:

The development and extension of modern communication innovations at an extraordinary speed has caused crucial changes in all financial, social, social and political areas of the world. The improvement of toady and cable innovations, in expansion to expanding the generation and dissemination needs of worldwide programs; the financial defense made it more appealing. The alter of the administration of mechanical economy to data economy and benefit economy in created nations brought approximately uncommon advancements within the standards of world exchange and as a result, it caused the extension of media organizations in outside measurements, and the advancement of financial speculations in many Asian nations, beside the worldwide demand for the utilization of media merchandise, made new markets, and the media both within the household scene of the nations and within the universal field. Universal and financial are of great significance and have and viable and compelling nearness within the condition of picking up, keeping up and expanding financial control and riches within the world. Moreover, mechanical progresses and mechanical joining are critical components in media auxiliary alter. This auxiliary alter took put beneath the impact of digitalization. That’s, the method that broke the boundaries between electronic media administrations. Until presently, the direction of mass media was totally subordinate on certain styles of data transmission that were for the most part utilized. Digitization made it conceivable for any content to be effortlessly transmitted through distinctive electronic transmission styles, and this media merging has had clear impacts on media approaches and the way mass media are controlled.

Keywords: media, digital era, digital ages, media convergence

Procedia PDF Downloads 75
253 The Applicability of Western Environmental Criminology Theories to the Arabic Context

Authors: Nawaf Alotaibi, Andy Evans, Alison Heppenstall, Nick Malleson

Abstract:

Throughout the last two decades, motor vehicle theft (MVT) has accounted for the largest proportion of property crime incidents in Saudi Arabia (SA). However, to date, few studies have investigated SA’s MVT problem. Those that have are primarily focused on the characteristics of car thieves, and most have overlooked any spatial-temporal distribution of MVT incidents and the characteristics of victims. This paper represents the first step in understanding this problem by reviewing the existing MVT studies contextualised within the theoretical frameworks developed in environmental criminology theories – originating in the West – and exploring to what extent they are relevant to the SA context. To achieve this, the paper has identified a range of key features in SA that are different from typical Western contexts, that could limit the appropriateness and capability of applying existing environmental criminology theories. Furthermore, despite these Western studies reviewed so far having introduced a number of explanatory variables for MVT rates, a range of significant elements are apparently absent in the current literature and this requires further analysis. For example, almost no attempts have been made to quantify the associations between the locations of vehicle theft, recovery of stolen vehicles, joyriding and traffic volume.

Keywords: environmental criminology theories, motor vehicle theft, Saudi Arabia, spatial analysis

Procedia PDF Downloads 299