Search results for: Military Crime
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 982

Search results for: Military Crime

472 A Content Analysis of Us Media Framing of Conflict: Effects on Global Journalism and Its Social Consequences

Authors: Lee Artz

Abstract:

This presentation outlines US media frames of recent interventions in Iraq, Afghanistan, and Syria and their impact on global media and public discourse. A content analysis of sources, descriptors, and contexts of leading US media (AP, New York Times, Fox News) finds that news coverage highlights terrorism, justifies military action, and downplays the human costs. These media frames that normalize intervention also omit coverage of the environmental consequences of war, with scant or no reporting on pollution, destruction and contamination of agricultural infrastructures and the difficulty of any environmentally sustainable recovery. A content analysis of leading European and Middle East media (Daily Mail, Le Monde, Deutsch Welle, Al Jazeera) indicates that they have adopted the same reporting practices, frames, and techniques resulting in a hybrid, yet homogeneous, increasingly global news environment that does a disservice to the public interest and democracy.

Keywords: conflict, environment, media framing, public interest

Procedia PDF Downloads 174
471 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance

Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz

Abstract:

The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.

Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor

Procedia PDF Downloads 48
470 Analysis of Bending Abilities of Soft Pneumatic Actuator

Authors: Jeevan Balaji, Shreyas Chigurupati

Abstract:

Pneumatic gripper use compressed air to operate its actuators (fingers). Unlike the conventional metallic gripper, a soft pneumatic actuator (SPA) can be used for relocating fragile objects. An added advantage for this gripper is that the pressure exerted on the object can be varied by changing the dimensions of the air chambers and also by the number of chambers. SPAs have many benefits over conventional robots in the military, medical fields because of their compliance nature and are easily produced using the 3D printing process. In the paper, SPA is proposed to perform pick and place tasks. A design was developed for the actuators, which is convenient for gripping any fragile objects. Thermoplastic polyurethane (TPU) is used for 3D printing the actuators. The actuator model behaves differently as the parameters such as its chamber height, number of chambers change. A detailed FEM model of the actuator is drafted for different pressure inputs using ABAQUS CAE software, and a safe loading pressure range is found.

Keywords: soft robotics, pneumatic actuator, design and modelling, bending analysis

Procedia PDF Downloads 138
469 Idea of International Criminal Justice in the Function of Prosecution International Crimes

Authors: Vanda Božić, Željko Nikač

Abstract:

The wars and armed conflicts have often resulted in violations of international humanitarian law, and often commit the most serious international crimes such as war crimes, crimes against humanity, aggression and genocide. However, only in the XX century the rule was articulated idea of establishing a body of international criminal justice in order to prosecute these crimes and their perpetrators. The first steps in this field have been made by establishing the International military tribunals for war crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. In the end, The International Criminal Court was established in Rome in 1998 with the aim of justice and in order to give satisfaction the victims of crimes and their families. The aim of the paper was to provide a historical and comparative analysis of the institutions of international criminal justice based on which these institutions de lege lata fulfilled the goals of individual criminal responsibility and justice. Furthermore, the authors suggest de lege ferenda that the Permanent International Criminal Tribunal, in addition to the prospective case, also takes over the current ICTY and ICTR cases.

Keywords: international crimes, international criminal justice, prosecution of crimes, ad hoc tribunal, the international criminal court

Procedia PDF Downloads 252
468 The Nexus between Climate Change and Criminality: The Nigerian Experience

Authors: Dagaci Aliyu Manbe, Anthony Abah Ebonyi

Abstract:

The increase in global temperatures is worsened by frequent natural events and human activities. Climate change has taken a prominent space in the global discourse on crime and criminality. Compared to when the subject centred around the discussion on the depletion of the ozone layer and global warming, today, the narrative revolves around the implications of changes in weather and climatic conditions in relations to violent crimes or conflict that traverse vast social, economic, and political spaces in different countries. Global warming and climate change refer to an increase in average global temperatures in the Earth’s near-surface air and oceans, which occurs due to human activities such as deforestation and the burning of fossil fuel such as gas flaring. The trend is projected to continue, if unchecked. This paper seeks to explore the nexus between climate change and criminality in Nigeria. It further examines the main ecological changes that predispose conflict dynamics of security threats factored by climate change to peaceful co-existence in Nigeria. It concludes with some recommendations on the way forward.

Keywords: conflict, climate change, criminality, global warning, peace

Procedia PDF Downloads 150
467 Corporate Social Responsibility and Dividend Policy

Authors: Mohammed Benlemlih

Abstract:

Using a sample of 22,839 US firm-year observations over the 1991-2012 period, we find that high CSR firms pay more dividends than low CSR firms. The analysis of individual components of CSR provides strong support for this main finding: five of the six individual dimensions are also associated with high dividend payout. When analyzing the stability of dividend payout, our results show that socially irresponsible firms adjust dividends more rapidly than socially responsible firms do: dividend payout is more stable in high CSR firms. Additional results suggest that firms involved in two controversial activities -the military and alcohol - are associated with low dividend payouts. These findings are robust to alternative assumptions and model specifications, alternative measures of dividend, additional control, and several approaches to address endogeneity. Overall, our results are consistent with the expectation that high CSR firms may use dividend policy to manage the agency problems related to overinvestment in CSR.

Keywords: corporate social responsibility, dividend policy, Lintner model, agency theory, signaling theory, dividend stability

Procedia PDF Downloads 239
466 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment

Authors: Arslan Murtaza

Abstract:

RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.

Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient

Procedia PDF Downloads 307
465 Single Ended Primary Inductance Converter with Internal Model Controller

Authors: Fatih Suleyman Taskincan, Ahmet Karaarslan

Abstract:

In this article, the study and analysis of Single Ended Primary Inductance Converter (SEPIC) are presented for battery charging applications that will be used in military applications. The usage of this kind of converters come from its advantage of non-reverse polarity at outputs. As capacitors charge and discharge through inductance, peak current does not occur on capacitors. Therefore, the efficiency will be high compared to buck-boost converters. In this study, the converter (SEPIC) is designed to be operated with Internal Model Controller (IMC). The traditional controllers like Proportional Integral Controller are not preferred as its linearity behavior. Hence IMC is designed for this converter. This controller is a model-based control and provides more robustness and better set point monitoring. Moreover, it can be used for an unstable process where the conventional controller cannot handle the dynamic operation. Matlab/Simulink environment is used to simulate the converter and its controller, then, the results are shown and discussed.

Keywords: DC/DC converter, single ended primary inductance converter, SEPIC, internal model controller, IMC, switched mode power supply

Procedia PDF Downloads 605
464 Influences of Victimization Experiences on Delinquency: Comparison between Young Offenders and Non-Offenders

Authors: Yoshihiro Horio

Abstract:

Many young offenders grow up in difficult environments. It has often been suggested that many young offenders are victims of abuse. However, there were restricted to abuse or family’s problem. Little research has examined data on ‘multiple victimization’ experiences of young offenders. Thus, this study investigated the victimization experiences of young offenders, including child abuse at home, bullying at school, and crime in the community. Specifically, the number of victimization experiences of young offenders was compared with those of non-delinquents at home, school, and in the community. It was found that young offenders experienced significantly more victimization than non-delinquents. Additionally, the influence of childhood victimization on later misconduct and/or delinquency was examined, then it was founded that victimization experiences to be a risk factor for subsequent delinquency. The hierarchical multiple regression analysis showed that young offenders who had a strong emotional reaction to their experience of abuse began their misconduct at an earlier age. If juveniles start their misconduct early, the degree of delinquency will increase. The anger of young offenders was stronger than that of non-delinquents. A strong emotion of anger may be related to juvenile delinquency.

Keywords: abuse, bullying, delinquency, victimization, young offenders

Procedia PDF Downloads 222
463 Improving Coverage in Wireless Sensor Networks Using Particle Swarm Optimization Algorithm

Authors: Ehsan Abdolzadeh, Sanaz Nouri, Siamak Khalaj

Abstract:

Today WSNs have many applications in different fields like the environment, military operations, discoveries, monitoring operations, and so on. Coverage size and energy consumption are the important challenges that these networks need to face. This paper tries to solve the problem of coverage with a requirement of k-coverage and minimum energy consumption. In order to minimize energy consumption, visual sensor networks have been used that observe and process just those targets that are located in their view direction. As a result, sensor rotations have decreased, and subsequently, energy consumption has been minimized. To solve the problem of coverage particle swarm optimization, coverage optimization has been able to ensure coverage requirement together with minimizing sensor rotations while meeting the problem requirement of k≤14. So energy consumption has decreased, and this could extend the sensors’ lifetime subsequently.

Keywords: K coverage, particle union optimization algorithm, wireless sensor networks, visual sensor networks

Procedia PDF Downloads 92
462 Study on Wireless Transmission for Reconnaissance UAV with Wireless Sensor Network and Cylindrical Array of Microstrip Antennas

Authors: Chien-Chun Hung, Chun-Fong Wu

Abstract:

It is important for a commander to have real-time information to aware situations and to make decision in the battlefield. Results of modern technique developments have brought in this kind of information for military purposes. Unmanned aerial vehicle (UAV) is one of the means to gather intelligence owing to its widespread applications. It is still not clear whether or not the mini UAV with short-range wireless transmission system is used as a reconnaissance system in Taiwanese. In this paper, previous experience on the research of the sort of aerial vehicles has been applied with a data-relay system using the ZigBee modulus. The mini UAV developed is expected to be able to collect certain data in some appropriate theaters. The omni-directional antenna with high gain is also integrated into mini UAV to fit the size-reducing trend of airborne sensors. Two advantages are so far obvious. First, mini UAV can fly higher than usual to avoid being attacked from ground fires. Second, the data will be almost gathered during all maneuvering attitudes.

Keywords: mini UAV, reconnaissance, wireless transmission, ZigBee modulus

Procedia PDF Downloads 172
461 Design an Architectural Model for Deploying Wireless Sensor Network to Prevent Forest Fire

Authors: Saurabh Shukla, G. N. Pandey

Abstract:

The fires have become the most serious disasters to forest resources and the human environment. In recent years, due to climate change, human activities and other factors the frequency of forest fires has increased considerably. The monitoring and prevention of forest fires have now become a global concern for forest fire prevention organizations. Currently, the methods for forest fire prevention largely consist of patrols, observation from watch towers. Thus, software like deployment of the wireless sensor network to prevent forest fire is being developed to get a better estimate of the temperature and humidity prospects. Now days, wireless sensor networks are beginning to be deployed at an accelerated pace. It is not unrealistic to expect that in coming years the world will be covered with wireless sensor networks. This new technology has lots of unlimited potentials and can be used for numerous application areas including environmental, medical, military, transportation, entertainment, crisis management, homeland defense, and smart spaces.

Keywords: deployment, sensors, wireless sensor networks, forest fires

Procedia PDF Downloads 407
460 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations

Authors: Chastiti Mediafira Wulolo

Abstract:

Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.

Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism

Procedia PDF Downloads 164
459 Unmanned Air Vehicles against Disasters: Wildfires, Avalanches, Floods

Authors: İsmail Şimşekoğlu, Serkan Yılmaz

Abstract:

There have been great improvements in technology that caused epoch-making changes in aviation. Thus, we can control air vehicles from ground without pilots in them: The UAVs. Due to UAV’s lack of need of pilots and their small size make them have crucial importance for us. UAVs have variety of usage area, especially in military. However, as soldiers we believe that we can use UAVs for better purposes. In this essay we indicate the usage of UAVs for the sake of saving nature from destruction of disasters by expressing what happened in the past and what can possibly happen in the future, especially in firefighting, preventing avalanches and decreasing the effects of floods. These three disasters cause hazardous consequences to the nature. Wildfires endanger so many lives by burning and destroying what comes in their paths. The numbers of avalanches are increased with the global warming. The changes of seasons triggered floods all over the world that threaten the city life. Besides all of these people may lose their lives in order to intrude these disasters. Drones will do the job without involving people lives. Thus it will diminish the risks so drones will be used for the sake of nature and people.

Keywords: unmanned air vehicles, nature, firefighting, avalanche, flood

Procedia PDF Downloads 425
458 Investigation of TEC Using YOUTHSAT RaBIT Payload Data for Low Latitude Regions

Authors: Perumalla Naveen Kumar

Abstract:

Global Positioning System (GPS) is used for civilian and military user positioning applications. The accuracy of GPS is degrading mainly because of ionospheric error. It is very important to analyze the effects of ionosphere on the performance of satellite systems especially in the low latitude regions. These variations depend on the Total Electron Content (TEC) in the ionosphere. To investigate the variations in the atmosphere, a mini satellite known as YOUTHSAT is launched by India. This is the outcome of the collaboration between India and USSR. One of the YOUTHSAT Indian payload is RaBIT (Radio Beacon for Ionospheric Tomography). In this paper, YOUTHSAT RaBIT payload data for the three typical days of 2011 are considered. The analysis is carried out for four Indian stations. The variations of Slant TEC, elevation angle and azimuth angles are analyzed with respect to local time. The obtained results are encouraging.

Keywords: Global Positioning System (GPS), Total Electron Content (TEC), YOUTHSAT, Radio Beacon for Ionospheric Tomography (RaBIT)

Procedia PDF Downloads 361
457 An Investigation of Tourists’ Destination Loyalty: A Case Study of Bangkok, Thailand

Authors: Sukritta Larsen, Kevin Wongleedee

Abstract:

The purposes of this research were to study tourists’ destination loyalty from the perspective of international tourists in Bangkok and to study the level of interest to revisit Bangkok in the near future. A probability random sampling of 200 international tourists was utilized. Half of the sample group was male and the other half was female. A Likert-five-scale questionnaire was designed to collect the data and small in-depth interviews were also used to obtain their opinions. The findings revealed that the majority of respondents had a medium level of loyalty. When examined in detail, the destination loyalty indicators can be ranked according to the mean average from high to low as follows: to recommend the visit, to say positive things, to revisit in the next three years, to refer the information, and to plan to visit regularly. Finally, the findings from the in-depth interviews with small group of international tourists revealed that the major obstacles that prevented many international tourists who may interested in revisiting Thailand included traffic congestions, high crime rate, and political instability.

Keywords: destination loyalty, international tourists, revisit, Bangkok

Procedia PDF Downloads 321
456 Web-Based Criminal Diary: Paperless Criminal Evidence for Federal Republic of Nigeria

Authors: Yekini Nureni Asafe, Haastrup Victor Adeleye, Ikotun Abiodun Motunrayo, Ojo Olanrewaju

Abstract:

Web Based Criminal Diary is a web based application whereby data of criminals been convicted by a judge in the court of law in Nigeria are shown to the entire public. Presently, criminal records are kept manually in Nigeria, which means when a person needs to be investigated to know if the person has a criminal record in the country, there is need to pass through different manual processes. With the use of manual record keeping, the criminal records can easily be manipulated by people in charge. The focus of this research work is to design a web-based application system for criminal record in Nigeria, towards elimination of challenges (such as loss of criminal records, in-efficiency in criminal record keeping, data manipulation, and other attendant problems of paper-based record keeping) which surrounds manual processing currently in use. The product of this research work will also help to minimize crime rate in our country since the opportunities and benefits lost as a result of a criminal record create will a lifelong barriers for anyone attempting to overcome a criminal past in our country.

Keywords: court of law, criminal, criminal diary, criminal evidence, Nigeria, web-based

Procedia PDF Downloads 290
455 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect

Authors: Debasish Nandy

Abstract:

India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.

Keywords: bilateral, diplomacy, infiltration, terrorism

Procedia PDF Downloads 523
454 Multi-Sensor Target Tracking Using Ensemble Learning

Authors: Bhekisipho Twala, Mantepu Masetshaba, Ramapulana Nkoana

Abstract:

Multiple classifier systems combine several individual classifiers to deliver a final classification decision. However, an increasingly controversial question is whether such systems can outperform the single best classifier, and if so, what form of multiple classifiers system yields the most significant benefit. Also, multi-target tracking detection using multiple sensors is an important research field in mobile techniques and military applications. In this paper, several multiple classifiers systems are evaluated in terms of their ability to predict a system’s failure or success for multi-sensor target tracking tasks. The Bristol Eden project dataset is utilised for this task. Experimental and simulation results show that the human activity identification system can fulfill requirements of target tracking due to improved sensors classification performances with multiple classifier systems constructed using boosting achieving higher accuracy rates.

Keywords: single classifier, ensemble learning, multi-target tracking, multiple classifiers

Procedia PDF Downloads 240
453 Effect of a Stepwise Discontinuity on a 65 Degree Delta Wing

Authors: Nishit L. Sanil, Raza M. Khan

Abstract:

Increasing lift effectively at higher angles of attack has always been a daunting challenge in aviation especially on a delta wing. These are used on military jet fighter planes and has some undesirable characteristics, notably flow separation at high angles of attack and high drag at low speeds. In order to solve this problem, a design modification is modeled on a delta wing which would increase the lift so that we can improve maneuverability. To attain an increase in the lift of a 65 degree delta wing at higher angles of attack, a step-wise discontinuity is created at the upper surface of the delta wing. A normal delta wing is validated for comparison which would thereby give us a measure of flow separation and coefficient of lift affected by the modification. The results obtained deliver a significant increase in lift at higher angles of attack thereby delaying stall. Hence the benefits of the modification would aid the potential designs of aircraft’s in the time to come.

Keywords: coefficient of lift, delta wing, flow separation, step-wise discontinuity

Procedia PDF Downloads 282
452 Warfield Spying Robot Using LoRa

Authors: Madhavi T., Sireesha Sakhamuri, Hema Sri A., Harika K.

Abstract:

Today as technological advancements are taking place, these advancements are being used by the armed forces to reduce the risk of their losses and to defeat their enemies. The development of sophisticated technology relies mostly on the use of high- tech weapons or machinery. Robotics is one of the hot spheres of the modern age in which nations concentrate on the state of war and peace for military purposes. They have been in use for demining and rescue operations for some time now but are being propelled by using them for combat and spy missions. This project focuses on creating a LoRa-based spying robot with a wireless IP camera attached to it that can rising the human target. This robot transmits the signal via an IP camera to the base station. One of this project’s major applications can be analyzed using a PC that can be used to control the robot’s movement. The robot sends the signal through the LoRa transceiver at the base station to the LoRa transceiver mounted on the robot. With this function, the, robot can relay videos in real- time along with anti-collision capabilities and the enemies in the war zone cannot recognize them. More importantly, this project focuses on increasing communication using LoRa.

Keywords: lora, IP cam, metal detector, laser shoot

Procedia PDF Downloads 84
451 Limes Africanus: Tribes, Romans and Islamic Dynasties

Authors: Erika Mattio , Edoardo Casolo

Abstract:

This project studies in a complete and innovative way the lesser known southern roman border: the limes africanus. In this work, thanks to the comparison of archaeological, historical and epigraphic sources, the evolution and changes that occurred in the cities and areas around the limes were analysed. As of now, there are many studies relative to the roman imperial period, however there are not that many analysing the evolution of the limes from the Islamic conquest to the modern day, comparing the ancient, byzantine, islamic and contemporary periods, understanding the significance of the limes, it s role and the cities and commerce that were defined by it in north Africa. Using modern methods of remote sensing and landscape archaeology, a georeferencing of the area documented in the thirties of the last century by French military aviation colonel Jean Baradez was created, showing that the limes africanus had survived the fall of the roman empire and continued to be important also for the Islamic dynasties that came later, even until the italo-turkish war and the Italian conquest of Libya. With this research we wish to demonstrate the continuation through time of the limes africanus and whether today it exists still or not.

Keywords: Limes Tripolitanus, Muslim, North Africa, Romans

Procedia PDF Downloads 177
450 Advocating in the Criminal Justice System for Individuals Who Use Drugs: Advice from Advocates in the Greater Vancouver Area

Authors: Haley Hrymak

Abstract:

For decades drug addiction has been understood to be a health problem and not a social problem. While research has advanced to allow for a more comprehensive understanding of the factors affecting addiction, the justice system has lagged behind. Given all that is known about addiction as a health issue and the need for effective rehabilitation to prevent further involvement with crime, there is a need for a dramatic shift in order to ensure individual's human right to health is being upheld within the Canadian criminal justice system. This research employs the qualitative methodology to interview advocates who work with substance users within the Greater Vancouver area to explore best practices for representing individuals with substance abuse issues within the Canadian justice system. The research shows that treatment, not punishment, is what is needed in order for recidivism to be reduced for individuals with substance abuse issues. The creative options that advocates employ to work within the current system are intended to provide a guide for lawyers working within the current criminal justice system.

Keywords: addiction, criminal law, right to health, rehabilitation

Procedia PDF Downloads 129
449 Content Based Face Sketch Images Retrieval in WHT, DCT, and DWT Transform Domain

Authors: W. S. Besbas, M. A. Artemi, R. M. Salman

Abstract:

Content based face sketch retrieval can be used to find images of criminals from their sketches for 'Crime Prevention'. This paper investigates the problem of CBIR of face sketch images in transform domain. Face sketch images that are similar to the query image are retrieved from the face sketch database. Features of the face sketch image are extracted in the spectrum domain of a selected transforms. These transforms are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Walsh Hadamard Transform (WHT). For the performance analyses of features selection methods three face images databases are used. These are 'Sheffield face database', 'Olivetti Research Laboratory (ORL) face database', and 'Indian face database'. The City block distance measure is used to evaluate the performance of the retrieval process. The investigation concludes that, the retrieval rate is database dependent. But in general, the DCT is the best. On the other hand, the WHT is the best with respect to the speed of retrieving images.

Keywords: Content Based Image Retrieval (CBIR), face sketch image retrieval, features selection for CBIR, image retrieval in transform domain

Procedia PDF Downloads 465
448 Design and Simulation of Step Structure RF MEMS Switch for K Band Applications

Authors: G. K. S. Prakash, Rao K. Srinivasa

Abstract:

MEMS plays an important role in wide range of applications like biological, automobiles, military and communication engineering. This paper mainly investigates on capacitive shunt RF MEMS switch with low actuation voltage and low insertion losses. To trim the pull-in voltage, a step structure has introduced to trim air gap between the beam and the dielectric layer with that pull in voltage is trim to 2.9 V. The switching time of the proposed switch is 39.1μs, and capacitance ratio is 67. To get more isolation, we have used aluminum nitride as dielectric material instead of silicon nitride (Si₃N₄) and silicon dioxide (SiO₂) because aluminum nitride has high dielectric constant (εᵣ = 9.5) increases the OFF capacitance and eventually increases the isolation of the switch. The results show that the switch is ON state involves return loss (S₁₁) less than -25 dB up to 40 GHz and insertion loss (S₂₁) is more than -1 dB up to 35 GHz. In OFF state switch shows maximum isolation (S₂₁) of -38 dB occurs at a frequency of 25-27 GHz for K band applications.

Keywords: RF MEMS, actuation voltage, isolation loss, switches

Procedia PDF Downloads 343
447 Continuous Wave Interference Effects on Global Position System Signal Quality

Authors: Fang Ye, Han Yu, Yibing Li

Abstract:

Radio interference is one of the major concerns in using the global positioning system (GPS) for civilian and military applications. Interference signals are produced not only through all electronic systems but also illegal jammers. Among different types of interferences, continuous wave (CW) interference has strong adverse impacts on the quality of the received signal. In this paper, we make more detailed analysis for CW interference effects on GPS signal quality. Based on the C/A code spectrum lines, the influence of CW interference on the acquisition performance of GPS receivers is further analysed. This influence is supported by simulation results using GPS software receiver. As the most important user parameter of GPS receivers, the mathematical expression of bit error probability is also derived in the presence of CW interference, and the expression is consistent with the Monte Carlo simulation results. The research on CW interference provides some theoretical gist and new thoughts on monitoring the radio noise environment and improving the anti-jamming ability of GPS receivers.

Keywords: GPS, CW interference, acquisition performance, bit error probability, Monte Carlo

Procedia PDF Downloads 239
446 The 'Currency' of Dolus Eventualis Considered during Sentencing for Murder

Authors: Reuben Govender

Abstract:

Culpability is an essential element for an accused to be held liable for a crime. The mental element or mens rea determines blameworthiness of an accused on a charge of killing a person. The mens rea required for a conviction of murder is intent while culpable homicide requires negligence. Central to blameworthiness in mens rea is individual freedom and voluntariness. The test for intent is subjective and objective for negligence. This paper presents a review of dolus eventualis in the context of murder trials and from a South African perspective. This paper poses a central questions namely, is dolus eventualis a ‘weaker currency’ during sentencing for murder? This paper attempts to answer this question by reviewing the concept of dolus eventualis, the test in judicial application, a review of decided South African cases in its application, its incorrect application and finally, considerations for its correct application. Lastly, the ‘weight’ of a dolus eventualis conviction in terms of sentencing will be reviewed to support the central question which is answered in the negative.

Keywords: dolus eventualis, dolus indeterminatus, dolus generalis, mens rea

Procedia PDF Downloads 218
445 IIROC's Enforcement Performance: Funnel in, Funnel out, and Funnel away

Authors: Mark Lokanan

Abstract:

The paper analyzes the processing of complaints against investment brokers and dealer members through the Investment Industry Regulatory Organization of Canada (IIROC) from 2008 to 2017. IIROC is the self-regulatory organization (SRO) that is responsible for policing investment dealers and brokerage firms that trade in Canada’s securities market. Data from the study came from IIROC's enforcement annual reports for the years examined. The case processing is evaluated base on the misconduct funnel that was originally designed for street crime and applies to the enforcement of investment fraud. The misconduct funnel is used as a framework to examine IIROC’s claim that it brought in more complaints (funnel in) than government regulators and shows how these complaints are funneled out and funneled away as they are processed through IIROC’s enforcement system. The results indicate that IIROC is ineffective in disciplining its members and is unable to handle the more serious quasi-criminal and improper sales practices offenses. It is hard not to see the results of the paper being used by the legislator in Ottawa to show the importance of a federal securities regulatory agency such as the Securities and Exchange Commission (SEC) in the United States.

Keywords: investment fraud, securities regulation, compliance, enforcement

Procedia PDF Downloads 138
444 Ethnic Conflict Dynamics in the Ethiopian Federation: Case of the Oromo-Somali Conflict

Authors: Takele Bekele Bayu

Abstract:

Though Ethiopia is an ancient country with ethnocultural and linguistic diversity, modern Ethiopia came into being in the second half of the 19th century under the military expansion of King Menelik II. Since then, the subsequent political system in the country failed to recognize and accommodate the country’s ethnolinguistic diversity. However, in 1991 the new government led by the Ethiopian People's Revolutionary Democratic Front (EPRDF) adopted federal-state structuring whereby constitutionally recognized and institutionally accommodated the country’s diversity. This investigation aimed to analyze drivers of ethnic conflict and its dynamism along the Eastern shared border of the Somali and Oromia regional administrations within the federal framework. The paper employed a comparative research design, adopted mixed research methods, and used survey questionnaires and focus group discussions (FGDs) for data collection. The study found that the Somali-Oromo conflict is complex and the dynamics and the sources of conflict in the study areas are similar.

Keywords: Ethiopia, Oromo, Somali, ethnic conflict, federalism

Procedia PDF Downloads 56
443 The Nature of Origin of New Criminal Occurrences in Gjakova Region: Cultural and Criminological “Intersection” in 1999-2009

Authors: Bekim Avdiaj

Abstract:

The transition period of Kosovo society brought fundamental changes in all the spheres of organizing life. This was the period when also in the cultural tradition the biggest movement and an emerging from ‘isolation’ or from the ‘shell’ occurred. Transformation of the traditional and embracing of the modern began here. The same was experienced and is currently being experienced also by Gjakova and its surrounding which is historically renowned for its great tradition and culture. The population of this region is actually facing a transition from the traditional system into the modern one and quite often with huge leaps. These ‘movements’ or ‘evolutions’ of the society of this region, besides the numerous positive things it ‘harvested’, also brought things that do not at all correspond with their tradition as well as new criminal occurrences which in the past were not present in this area. Furthermore, some of the ‘new’ behaviours that are embraced from other ‘cultures’ and ‘civilizations’, and which are often exceeded, are quite perturbing. The security situation is also worrying, particularly following the appearance of some new criminal occurrences. Therefore, with this research paper we will strive to analyse the new cultural “intersections” as well as the nature of the origin of some new very worrying criminal occurrences. We will present there also some factors inciting into these occurrences, which were confessed by the persons involved in these criminal occurrences and who come from this very region.

Keywords: crime, occurrence, culture, Gjakova Region

Procedia PDF Downloads 330