Search results for: criminal code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1762

Search results for: criminal code

1102 The Power of Words: A Corpus Analysis of Campaign Speeches of President Donald J. Trump

Authors: Aiza Dalman

Abstract:

Words are powerful when these are used wisely and strategically. In this study, twelve (12) campaign speeches of President Donald J. Trump were analyzed as to frequently used words and ethos, pathos and logos being employed. The speeches were read thoroughly, analyzed and interpreted. With the use of Word Counter Tool and Text Analyzer software accessible online, it was found out that the word ‘will’ has the highest frequency of 121, followed by Hillary (58), American (38), going (35), plan and Clinton (32), illegal (30), government (28), corruption (26) and criminal (24). When the speeches were analyzed as to ethos, pathos and logos, on the other hand, it revealed that these were all employed in his speeches. The statements under these pointed out against Hillary or in his favor. The unique strategy of President Donald J. Trump as to frequently used words and ethos, pathos and logos in persuading people perhaps lead the way to his victory.

Keywords: campaign speeches, corpus analysis, ethos, logos and pathos, power of words

Procedia PDF Downloads 267
1101 Comparison of Water Equivalent Ratio of Several Dosimetric Materials in Proton Therapy Using Monte Carlo Simulations and Experimental Data

Authors: M. R. Akbari , H. Yousefnia, E. Mirrezaei

Abstract:

Range uncertainties of protons are currently a topic of interest in proton therapy. Two of the parameters that are often used to specify proton range are water equivalent thickness (WET) and water equivalent ratio (WER). Since WER values for a specific material is nearly constant at different proton energies, it is a more useful parameter to compare. In this study, WER values were calculated for different proton energies in polymethyl methacrylate (PMMA), polystyrene (PS) and aluminum (Al) using FLUKA and TRIM codes. The results were compared with analytical, experimental and simulated SEICS code data obtained from the literature. In FLUKA simulation, a cylindrical phantom, 1000 mm in height and 300 mm in diameter, filled with the studied materials was simulated. A typical mono-energetic proton pencil beam in a wide range of incident energies usually applied in proton therapy (50 MeV to 225 MeV) impinges normally on the phantom. In order to obtain the WER values for the considered materials, cylindrical detectors, 1 mm in height and 20 mm in diameter, were also simulated along the beam trajectory in the phantom. In TRIM calculations, type of projectile, energy and angle of incidence, type of target material and thickness should be defined. The mode of 'detailed calculation with full damage cascades' was selected for proton transport in the target material. The biggest difference in WER values between the codes was 3.19%, 1.9% and 0.67% for Al, PMMA and PS, respectively. In Al and PMMA, the biggest difference between each code and experimental data was 1.08%, 1.26%, 2.55%, 0.94%, 0.77% and 0.95% for SEICS, FLUKA and SRIM, respectively. FLUKA and SEICS had the greatest agreement (≤0.77% difference in PMMA and ≤1.08% difference in Al, respectively) with the available experimental data in this study. It is concluded that, FLUKA and TRIM codes have capability for Bragg curves simulation and WER values calculation in the studied materials. They can also predict Bragg peak location and range of proton beams with acceptable accuracy.

Keywords: water equivalent ratio, dosimetric materials, proton therapy, Monte Carlo simulations

Procedia PDF Downloads 306
1100 The Influence of Parenting Patterns on Adolescent Deliquincy

Authors: Salsabila Rizka Pratama

Abstract:

In this day and age, delinquency has become common to young children, and it is a violation of the norms, and legal systems of a society that are carried out during adolescenceIt is the transition from childhood to adulthood. PerversionYouth from criminal law are a common problem among adolescents in homes, schools, and communities. Without proper treatment, delinquency can turn into a crime and is likely to send a child to prison. If dug deeper, the development of delinquency is strongly influenced by family and community life. Families play an important role in the prevention of delinquency. One way a family can help prevent delinquency is by using the proper upbringing. The upbringing that parents use affects children's behavior. Improper parenting can lead to delinquency. On the other hand, proper parenting will prevent delinquency. But delinquency is not influenced only by parental upbringing, the appearance of delinquency can be influenced by the environment, religion, economic factors, information technology factors.

Keywords: parenting, parents, juvenile delinquency, family, youth, crime, environment, religion, economy, information technology

Procedia PDF Downloads 142
1099 Who Killed Kalief? Examining the Effects of Solitary Confinement on Juvenile Detainees in the United States

Authors: Esther Baldwin

Abstract:

It is well settled that the use of solitary confinement can cause psychological and physical harm to detainees. For juveniles, who are more susceptible to irreparable harm due to their underdeveloped psyches, the risks are exacerbated. Despite these risks, across the United States juvenile detainees are regularly held in isolation for prolonged periods of time. This essay will examine the broad impact of solitary confinement on juvenile detainees while giving particular focus to the story of Kalief Browder, a juvenile awaiting trial on Rikers Island in New York for a period of three years, nearly two years of which were spent in solitary confinement. Although sadly, his story is not uncommon, Kalief’s story offers a unique perspective in that it provides first-hand insight on the effects of solitary confinement on juveniles. It is our hope that by sharing his story, we will demand better detention practices and policies for juveniles under correctional control in the United States.

Keywords: criminal justice system, juveniles, Kalief browder, solitary confinement

Procedia PDF Downloads 312
1098 Confusion on the Definition of Terrorism and Difficulty in Criminalizing Terrorist Financing

Authors: Hamed Tofangsaz

Abstract:

In the absence of an internationally agreed definition of terrorism, the question which needs to be posed is whether there is a clear and common understanding of what constitutes terrorism, terrorist acts and terrorist groups, the financing of which needs to be stopped. That is, from a criminal law perspective, whether the Terrorist Financing Convention, as the backbone of the counter-terrorist financing regime, clarifies what types of conduct, by who, in what circumstances and when, against whom (targets or victims) and with what intention or motivation should be considered terrorism? It will be explained how and why it has been difficult to reach an agreement on the definition of terrorism. The endeavour of the drafters of the Terrorist Financing Convention and others involved in countering terrorist financing to establish a general definition of terrorism will be examined. The record of attempts to define the elements of terrorism proves that it is hardly possible to reach an agreement on a generic definition of terrorism because the concept of terrorism is elusive and subject to various understandings. Even the definition provided by the Terrorist Financing Convention, is not convincing. With regard to the findings, this paper calls for further research on the legal consequences of the implementation of the terrorist financing-counter measures while the scope of terrorism, terrorist acts and terrorist organizations have been left vague.

Keywords: terrorism, terrorist financing, crime, convention

Procedia PDF Downloads 562
1097 Culture and Deviance Told by Skin: Non Verbal Communication of Tattoos

Authors: Andreas Aceranti, Simonetta Vernocchi, Marco Colorato, Ludwig Conistabile, Martina Falappi

Abstract:

This study was born out of the necessity to delve into and understand the intricate world of tattoos, a millenary art that lays its foundation, although sometimes complex, for effective non-verbal communication. What is most astonishing about a phenomenon such as irreversibly branding the skin, which at first glance may appear superficial, especially in the eyes of those who do not fully understand its meaning, is the fact that it is actually one of the most enduring forms of communication: body modification through tattoos or ornamental dyes indicated the wearer's membership in a particular ethnic group, social class or religious community. Even within crime-based aggregations, tattoos had (and still have) the purpose of conveying one's affiliation to a particular group, thus making one's criminal identity known. The profession of a language and cultural mediator teaches that it is essential to be able to read between the lines to grasp all those aspects that words alone do not convey. Tattooing, therefore, becomes a tool of analysis and a language that is not secondary to be taken into account for an in-depth reading of the reality that surrounds us and of cultures different from our own.

Keywords: tattoo, cultural tattoos, tattooing, non verbal communication

Procedia PDF Downloads 193
1096 Face Sketch Recognition in Forensic Application Using Scale Invariant Feature Transform and Multiscale Local Binary Patterns Fusion

Authors: Gargi Phadke, Mugdha Joshi, Shamal Salunkhe

Abstract:

Facial sketches are used as a crucial clue by criminal investigators for identification of suspects when the description of eyewitness or victims are only available as evidence. A forensic artist develops a sketch as per the verbal description is given by an eyewitness that shows the facial look of the culprit. In this paper, the fusion of Scale Invariant Feature Transform (SIFT) and multiscale local binary patterns (MLBP) are proposed as a feature to recognize a forensic face sketch images from a gallery of mugshot photos. This work focuses on comparative analysis of proposed scheme with existing algorithms in different challenges like illumination change and rotation condition. Experimental results show that proposed scheme can lead to better performance for the defined problem.

Keywords: SIFT feature, MLBP, PCA, face sketch

Procedia PDF Downloads 326
1095 A Research on Determining the Viability of a Job Board Website for Refugees in Kenya

Authors: Prince Mugoya, Collins Oduor Ondiek, Patrick Kanyi Wamuyu

Abstract:

Refugee Job Board Website is a web-based application that provides a platform for organizations to post jobs specifically for refugees. Organizations upload job opportunities and refugees can view them on the website. The website also allows refugees to input their skills and qualifications. The methodology used to develop this system is a waterfall (traditional) methodology. Software development tools include Brackets which will be used to code the website and PhpMyAdmin to store all the data in a database.

Keywords: information technology, refugee, skills, utilization, economy, jobs

Procedia PDF Downloads 152
1094 Precise CNC Machine for Multi-Tasking

Authors: Haroon Jan Khan, Xian-Feng Xu, Syed Nasir Shah, Anooshay Niazi

Abstract:

CNC machines are not only used on a large scale but also now become a prominent necessity among households and smaller businesses. Printed Circuit Boards manufactured by the chemical process are not only risky and unsafe but also expensive and time-consuming. A 3-axis precise CNC machine has been developed, which not only fabricates PCB but has also been used for multi-tasks just by changing the materials used and tools, making it versatile. The advanced CNC machine takes data from CAM software. The TB-6560 controller is used in the CNC machine to adjust variation in the X, Y, and Z axes. The advanced machine is efficient in automatic drilling, engraving, and cutting.

Keywords: CNC, G-code, CAD, CAM, Proteus, FLATCAM, Easel

Procedia PDF Downloads 145
1093 Education Delivery in Youth Justice Centres: Inside-Out Prison Exchange Program Pedagogy in an Australian Context

Authors: Tarmi A'Vard

Abstract:

This paper discusses the transformative learning experience for students participating in the Inside-Out Prison Exchange Program (Inside-out) and explores the value this pedagogical approach may have in youth justice centers. Inside-Out is a semester-long university course which is unique as it takes 15 university students, with their textbook and theory-based knowledge, behind the walls to study alongside 15 incarcerated students, who have the lived experience of the criminal justice system. Inside-out is currently offered in three Victorian prisons, expanding to five in 2020. The Inside-out pedagogy which is based on transformative dialogic learning is reliant upon the participants sharing knowledge and experiences to develop an understanding and appreciation of the diversity and uniqueness of one another. Inside-out offers the class an opportunity to create its own guidelines for dialogue, which can lead to the student’s sense of equality, which is fundamental in the success of this program. Dialogue allows active participation by all parties in reconciling differences, collaborating ideas, critiquing and developing hypotheses and public policies, and encouraging self-reflection and exploration. The structure of the program incorporates the implementation of circular seating (where the students alternate between inside and outside), activities, individual reflective tasks, group work, and theory analysis. In this circle everyone is equal, this includes the educator, who serves as a facilitator more so than the traditional teacher role. A significant function of the circle is to develop a group consciousness, allowing the whole class to see itself as a collective, and no one person holds a superior role. This also encourages participants to be responsible and accountable for their behavior and contributions. Research indicates completing academic courses, like Inside-Out, contributes positively to reducing recidivism. Inside-Out’s benefits and success in many adult correctional institutions have been outlined in evaluation reports and scholarly articles. The key findings incorporate the learning experiences for the students in both an academic capability and professional practice and development. Furthermore, stereotypes and pre-determined ideas are challenged, and there is a promotion of critical thinking and evidence of self-discovery and growth. There is empirical data supporting positive outcomes of education in youth justice centers in reducing recidivism and increasing the likelihood of returning to education upon release. Hence, this research could provide the opportunity to increase young people’s engagement in education which is a known protective factor for assisting young people to move away from criminal behavior. In 2016, Tarmi completed the Inside-Out educator training in Philadelphia, Pennsylvania, and has developed an interest in exploring the pedagogy of Inside-Out, specifically targeting young offenders in a Youth Justice Centre.

Keywords: dialogic transformative learning, inside-out prison exchange program, prison education, youth justice

Procedia PDF Downloads 116
1092 Speech Community and Social Language Codes: A Sociolinguistic Study of Mampruli-English Codeswitching in Nalerigu, Ghana

Authors: Gertrude Yidanpoa Grumah

Abstract:

Ghana boasts of a rich linguistic diversity, with around eighty-seven indigenous languages coexisting with English, the official language. Within this multilingual environment, speech communities adopt bilingual code choices as a common practice, as people seamlessly switch between Ghanaian languages and English. Extensive research has delved into this phenomenon from various perspectives, including the role of bilingual code choices in teaching, its implications for language policy, and its significance in multilingual communities. Yet, a noticeable gap in the literature persists, with most studies focusing on codeswitching between English and the major southern Ghanaian languages like Twi, Ga, and Ewe. The intricate dynamics of codeswitching with minority indigenous languages, such as Mampruli spoken in northern Ghana, remain largely unexplored. This thesis embarks on an investigation into Mampruli-English codeswitching, delving into the linguistic practices of educated Mampruli speakers. The data collection methods encompass interviews, recorded radio programs, and ethnographic observation. The analytical framework employed draws upon the Ethnography of Communication, with observation notes and transcribed interviews thoughtfully classified into discernible themes. The research findings suggest that a bilingual's tendency to switch from Mampruli to English is significantly influenced by factors such as the level of education, age, gender, perceptions of language prestige, and religious beliefs. In essence, this study represents a pioneering endeavor, marking the first comprehensive study on codeswitching practices within the Mampruli-English context and making a significant contribution to our understanding of Mampruli linguistics, covering the social language codes reflecting the speech community. In a region where such research has been scarce for the past four decades, this study addresses a critical knowledge gap, shedding light on the intricate dynamics of language use in northern Ghana.

Keywords: codeswitching, English, ethnography of communication, Mampruli, sociolinguistics

Procedia PDF Downloads 47
1091 From Forked Tongues to Tinkerbell Ears: Rethinking the Criminalization of Alternative Body Modification in the UK

Authors: Luci V. Hyett

Abstract:

The criminal law of England and Wales currently deems that a person cannot consent to the infliction of injury upon their own body, where the level of harm is considered to be Actual or Grevious. This renders the defence of consent of the victim as being unavailable to those persons carrying out an Alternative Body Modification procedure. However, the criminalization of consensual injury is more appropriately deemed as being categorized as an offense against public morality and not one against the person, which renders the State’s involvement in the autonomous choices of a consenting adult, when determining what can be done to one’s own body, an arbitrary one. Furthermore, to recognise in law that a person is capable of giving a valid consent to socially acceptable cosmetic interventions that largely consist of procedures designed to aesthetically please men and, not those of people who want to modify their bodies for other reasons means that patriarchal attitudes are continuing to underpin public repulsion and inhibit social acceptance of such practices. Theoretical analysis will begin with a juridical examination of R v M(B) [2019] QB 1 where the High Court determined that Alternative Body Modification was not a special category exempting a person so performing from liability for Grevious Bodily Harm using the defence of consent. It will draw from its reasoning which considered that ‘the removal of body parts were medical procedures being carried out for no medical reason by someone not qualified to carry them out’ which will form the basis of this enquiry. It will consider the philosophical work of Georgio Agamben when analysing whether the biopolitical climate in the UK, which places the optimization of the perfect, healthy body at the centre of political concern can explain why those persons who wish to engage in Alternative Body Modification are treated as the ‘Exception’ to that which is normal using the ‘no medical reason’ canon to justify criminalisation, rather than legitimising the industry through regulation. It will consider, through a feminist lens, the current conflict in law between traditional cosmetic interventions which alter one’s physical appearance for socially accepted aesthetic purposes such as those to the breast, lip and buttock and, modifications described as more outlandish such as earlobe stretching, tooth filing and transdermal implants to create horns and spikes under the skin. It will assert that ethical principles relating to the psychological impact of body modification described as ‘alternative’ is used as a means to exclude person’s seeking such a procedure from receiving safe and competent treatment via a registered cosmetic surgeon which leads to these increasingly popular surgery’s being performed in Tattoo parlours throughout the UK as an extension to other socially acceptable forms of self-modification such as piercings. It will contend that only by ‘inclusive exclusion’ will those ‘othered’ through ostracisation be welcomed into the fold of normality and this can only be achieved through recognition of alternative body modification as a legitimate cosmetic intervention, subject to the same regulatory framework as existing practice. This would assist in refocusing the political landscape by erring on the side of liberty rather than that of biology.

Keywords: biopolitics, body modification, consent, criminal law

Procedia PDF Downloads 97
1090 Determinants of Hospital Obstetric Unit Closures in the United States 2002-2013: Loss of Hospital Obstetric Care 2002-2013

Authors: Peiyin Hung, Katy Kozhimannil, Michelle Casey, Ira Moscovice

Abstract:

Background/Objective: The loss of obstetric services has been a pressing concern in urban and rural areas nationwide. This study aims to determine factors that contribute to the loss of obstetric care through closures of a hospital or obstetric unit. Methods: Data from 2002-2013 American Hospital Association annual surveys were used to identify hospitals providing obstetric services. We linked these data to Medicare Healthcare Cost Report Information for hospital financial indicators, the US Census Bureau’s American Community Survey for zip-code level characteristics, and Area Health Resource files for county- level clinician supply measures. A discrete-time multinomial logit model was used to determine contributing factors to obstetric unit or hospital closures. Results: Of 3,551 hospitals providing obstetrics services during 2002-2013, 82% kept units open, 12% stopped providing obstetrics services, and 6% closed down completely. State-level variations existed. Factors that significantly increased hospitals’ probability of obstetric unit closures included lower than 250 annual birth volume (adjusted marginal effects [95% confidence interval]=34.1% [28%, 40%]), closer proximity to another hospital with obstetric services (per 10 miles: -1.5% [-2.4, -0.5%]), being in a county with lower family physician supply (-7.8% [-15.0%, -0.6%), being in a zip code with higher percentage of non-white females (per 10%: 10.2% [2.1%, 18.3%]), and with lower income (per $1,000 income: -0.14% [-0.28%, -0.01%]). Conclusions: Over the past 12 years, loss of obstetric services has disproportionately affected areas served by low-volume urban and rural hospitals, non-white and low-income communities, and counties with fewer family physicians, signaling a need to address maternity care access in these communities.

Keywords: access to care, obstetric care, service line discontinuation, hospital, obstetric unit closures

Procedia PDF Downloads 211
1089 Measurement and Simulation of Axial Neutron Flux Distribution in Dry Tube of KAMINI Reactor

Authors: Manish Chand, Subhrojit Bagchi, R. Kumar

Abstract:

A new dry tube (DT) has been installed in the tank of KAMINI research reactor, Kalpakkam India. This tube will be used for neutron activation analysis of small to large samples and testing of neutron detectors. DT tube is 375 cm height and 7.5 cm in diameter, located 35 cm away from the core centre. The experimental thermal flux at various axial positions inside the tube has been measured by irradiating the flux monitor (¹⁹⁷Au) at 20kW reactor power. The measured activity of ¹⁹⁸Au and the thermal cross section of ¹⁹⁷Au (n,γ) ¹⁹⁸Au reaction were used for experimental thermal flux measurement. The flux inside the tube varies from 10⁹ to 10¹⁰ and maximum flux was (1.02 ± 0.023) x10¹⁰ n cm⁻²s⁻¹ at 36 cm from the bottom of the tube. The Au and Zr foils without and with cadmium cover of 1-mm thickness were irradiated at the maximum flux position in the DT to find out the irradiation specific input parameters like sub-cadmium to epithermal neutron flux ratio (f) and the epithermal neutron flux shape factor (α). The f value was 143 ± 5, indicates about 99.3% thermal neutron component and α value was -0.2886 ± 0.0125, indicates hard epithermal neutron spectrum due to insufficient moderation. The measured flux profile has been validated using theoretical model of KAMINI reactor through Monte Carlo N-Particle Code (MCNP). In MCNP, the complex geometry of the entire reactor is modelled in 3D, ensuring minimum approximations for all the components. Continuous energy cross-section data from ENDF-B/VII.1 as well as S (α, β) thermal neutron scattering functions are considered. The neutron flux has been estimated at the corresponding axial locations of the DT using mesh tally. The thermal flux obtained from the experiment shows good agreement with the theoretically predicted values by MCNP, it was within ± 10%. It can be concluded that this MCNP model can be utilized for calculating other important parameters like neutron spectra, dose rate, etc. and multi elemental analysis can be carried out by irradiating the sample at maximum flux position using measured f and α parameters by k₀-NAA standardization.

Keywords: neutron flux, neutron activation analysis, neutron flux shape factor, MCNP, Monte Carlo N-Particle Code

Procedia PDF Downloads 146
1088 An Efficient Hardware/Software Workflow for Multi-Cores Simulink Applications

Authors: Asma Rebaya, Kaouther Gasmi, Imen Amari, Salem Hasnaoui

Abstract:

Over these last years, applications such as telecommunications, signal processing, digital communication with advanced features (Multi-antenna, equalization..) witness a rapid evaluation accompanied with an increase of user exigencies in terms of latency, the power of computation… To satisfy these requirements, the use of hardware/software systems is a common solution; where hardware is composed of multi-cores and software is represented by models of computation, synchronous data flow (SDF) graph for instance. Otherwise, the most of the embedded system designers utilize Simulink for modeling. The issue is how to simplify the c code generation, for a multi-cores platform, of an application modeled by Simulink. To overcome this problem, we propose a workflow allowing an automatic transformation from the Simulink model to the SDF graph and providing an efficient schedule permitting to optimize the number of cores and to minimize latency. This workflow goes from a Simulink application and a hardware architecture described by IP.XACT language. Based on the synchronous and hierarchical behavior of both models, the Simulink block diagram is automatically transformed into an SDF graph. Once this process is successfully achieved, the scheduler calculates the optimal cores’ number needful by minimizing the maximum density of the whole application. Then, a core is chosen to execute a specific graph task in a specific order and, subsequently, a compatible C code is generated. In order to perform this proposal, we extend Preesm, a rapid prototyping tool, to take the Simulink model as entry input and to support the optimal schedule. Afterward, we compared our results to this tool results, using a simple illustrative application. The comparison shows that our results strictly dominate the Preesm results in terms of number of cores and latency. In fact, if Preesm needs m processors and latency L, our workflow need processors and latency L'< L.

Keywords: hardware/software system, latency, modeling, multi-cores platform, scheduler, SDF graph, Simulink model, workflow

Procedia PDF Downloads 256
1087 Examining Institutional and Structural Racism to Address Persistent Racial Inequities in US Cities

Authors: Zoe Polk

Abstract:

In cities across the US, race continues to predict an individual’s likelihood to be employed, to receive a quality education, to live in a safe neighborhood, to life expectancy to contacts with the criminal justice system. Deep and pervasive disparities exist despite laws enacted at the federal, state and local level to eliminate discrimination. This paper examines the strengths of the U.S. civil rights movement in making discrimination a moral issue. Following the passage of the 1964 Civil Rights Act, cities throughout the US adopted laws that mirror the language, theories of practice and enforcement of the law. This paper argues that while those laws were relevant to the way discrimination was conducted in that time, they are limited in their ability to help cities address discrimination today. This paper reviews health indicators This paper concludes that in order for cities to create environments where race no longer predicts one’s success, cities must conduct institutional and structural racism audits.

Keywords: racism, racial equity, constitutional law, social justice

Procedia PDF Downloads 353
1086 Law as a Means to Address Conflict

Authors: Tim Bakken

Abstract:

The paper will discuss to what extent political polarization contributes to censorship, lack of civil discourse, and even violence. Most researchers have been unable to identify precisely what factors or processes contribute significantly to conflict. Absent such recognition, we have been unable to select effective remedies to address conflict. Through this paper, it will consider whether legal remedies can help to reduce conflict and polarization. My sense is that many current conflicts cannot be remedied primarily by law. But, there is little research on this hypothesis. Absent research and findings, nations may be looking to law for relief when, in fact, they should be looking at conditions underlying the formation of law or the absence of a more precise and effective legal remedy. It is hypothesized that the underlying reasons for conflict include sub-groups’ separation from the larger democratic society; misplaced loyalty to members of sub-groups; a culture of silence when recognizing wrongdoing; and retaliation against people who speak up. In sum, the greater distance citizens or institutions place between themselves and democratic norms, the more likely the members of a sub-group or institution will be to adopt conflict, even violence, as a method to obtain personal goals.

Keywords: constitutional law, conflict, criminal law, polarization

Procedia PDF Downloads 66
1085 Oath Taking-An Approach to Combating Criminality: Challenges and Implication to the Victim Centered Approach in Human Trafficking

Authors: Faith G. Ehiemua, Chandra E. Ulinfun

Abstract:

This work presents two approaches that use competing models to combat criminality in human trafficking. It argues that oath-taking is an approach used to combat and repress crime by natives of African descent. Therefore, certain value choices reflected explicitly or implicitly in its habitual functioning are features of crime control, a model of the criminal process used to repress and prevent crime. By pitting the approaches against each other, the work examines the utility of the purpose of each approach with the aim of assessing moral worthiness. The approaches adopted are descriptive, normative, and theoretical. The findings reveal that oath-taking is effective in human trafficking mainly because Africans believe that the African traditional system is efficient. However, the utilitarian ethical theory applied to the use of oath-taking in human trafficking shows oath-taking as protecting the interest of human traffickers against the general good of society.

Keywords: human rights, human trafficking, oath taking, utilitarianism, victim-centered approach

Procedia PDF Downloads 189
1084 Mediation as an Effective Tool for Resolving Sports Disputes

Authors: Mohd Akram Shair Mohamad

Abstract:

The relation to the infinite variety issues sprouting in sports or lex sportiva, like lex mercatoria in the early centuries, has now come of age and even begun a maturing process in the past thirty-five years or so. Lex sportiva now straddles sports management, sports medicine, tort, criminal law, employment contract, competition law and a host of multifarious activities related to sports. This has catapulted a host of legal issue and problems, demanding urgent legal solutions to actual or potential disputes. This paper discusses the nature and development of lex sportiva, and how it is able to resolve sports disputes. Resolving sports dispute via the tiresome, dilatory and expensive process of litigation is most unsuitable. Arbitration may not be equally a satisfactory solution. The paper strongly advocates the far the most effective and resolution friendly mode of settling sports disputes namely, mediation. In support it highlights numerous advantages mediation has to offer and with reference to many significant sports disputes which had been successfully resolved via mediation.

Keywords: alternative dispute resolution, mediation, arbitration, litigation

Procedia PDF Downloads 422
1083 Effects of the Visual and Auditory Stimuli with Emotional Content on Eyewitness Testimony

Authors: İrem Bulut, Mustafa Z. Söyük, Ertuğrul Yalçın, Simge Şişman-Bal

Abstract:

Eyewitness testimony is one of the most frequently used methods in criminal cases for the determination of crime and perpetrator. In the literature, the number of studies about the reliability of eyewitness testimony is increasing. The study aims to reveal the factors that affect the short-term and long-term visual memory performance of the participants in the event of an accident. In this context, the effect of the emotional content of the accident and the sounds during the accident on visual memory performance was investigated with eye-tracking. According to the results, the presence of visual and auditory stimuli with emotional content during the accident decreases the participants' both short-term and long-term recall performance. Moreover, the data obtained from the eye monitoring device showed that the participants had difficulty in answering even the questions they focused on at the time of the accident.

Keywords: eye tracking, eyewitness testimony, long-term recall, short-term recall, visual memory

Procedia PDF Downloads 148
1082 Visco-Hyperelastic Finite Element Analysis for Diagnosis of Knee Joint Injury Caused by Meniscal Tearing

Authors: Eiji Nakamachi, Tsuyoshi Eguchi, Sayo Yamamoto, Yusuke Morita, H. Sakamoto

Abstract:

In this study, we aim to reveal the relationship between the meniscal tearing and the articular cartilage injury of knee joint by using the dynamic explicit finite element (FE) method. Meniscal injuries reduce its functional ability and consequently increase the load on the articular cartilage of knee joint. In order to prevent the induction of osteoarthritis (OA) caused by meniscal injuries, many medical treatment techniques, such as artificial meniscus replacement and meniscal regeneration, have been developed. However, it is reported that these treatments are not the comprehensive methods. In order to reveal the fundamental mechanism of OA induction, the mechanical characterization of meniscus under the condition of normal and injured states is carried out by using FE analyses. At first, a FE model of the human knee joint in the case of normal state – ‘intact’ - was constructed by using the magnetron resonance (MR) tomography images and the image construction code, Materialize Mimics. Next, two types of meniscal injury models with the radial tears of medial and lateral menisci were constructed. In FE analyses, the linear elastic constitutive law was adopted for the femur and tibia bones, the visco-hyperelastic constitutive law for the articular cartilage, and the visco-anisotropic hyperelastic constitutive law for the meniscus, respectively. Material properties of articular cartilage and meniscus were identified using the stress-strain curves obtained by our compressive and the tensile tests. The numerical results under the normal walking condition revealed how and where the maximum compressive stress occurred on the articular cartilage. The maximum compressive stress and its occurrence point were varied in the intact and two meniscal tear models. These compressive stress values can be used to establish the threshold value to cause the pathological change for the diagnosis. In this study, FE analyses of knee joint were carried out to reveal the influence of meniscal injuries on the cartilage injury. The following conclusions are obtained. 1. 3D FE model, which consists femur, tibia, articular cartilage and meniscus was constructed based on MR images of human knee joint. The image processing code, Materialize Mimics was used by using the tetrahedral FE elements. 2. Visco-anisotropic hyperelastic constitutive equation was formulated by adopting the generalized Kelvin model. The material properties of meniscus and articular cartilage were determined by curve fitting with experimental results. 3. Stresses on the articular cartilage and menisci were obtained in cases of the intact and two radial tears of medial and lateral menisci. Through comparison with the case of intact knee joint, two tear models show almost same stress value and higher value than the intact one. It was shown that both meniscal tears induce the stress localization in both medial and lateral regions. It is confirmed that our newly developed FE analysis code has a potential to be a new diagnostic system to evaluate the meniscal damage on the articular cartilage through the mechanical functional assessment.

Keywords: finite element analysis, hyperelastic constitutive law, knee joint injury, meniscal tear, stress concentration

Procedia PDF Downloads 234
1081 Protection Not Punishment: Use of Electronic Monitoring to Reduce the Risk of Cross-Border Parental Child Abduction

Authors: Nazia Yaqub

Abstract:

Globally, the number of cases of international parental child abduction has remained consistent in the past decade despite the legal provision designed to prevent and deter abduction, and so it appears the current legal approach to prevent abduction is lacking. Reflecting on the findings of an empirical study conducted by the author between 2017-19 on parental abduction from the UK, the article considers a solution to the predicament of protecting children at risk of abduction through electronic monitoring. The electronic monitoring of children has negative connotations, particularly in its use in the criminal justice system, yet in the context of family law proceedings, the article considers whether electronic monitoring could serve a protective rather than a punitive purpose. The article reflects on the use of electronic monitoring in parental abduction cases by the Family Courts and examines the ethical considerations of the proposal, drawing on the rights found in the European Convention on Human Rights and the UN Convention on the Rights of the Child.

Keywords: law, parental child abduction, electronic monitoring, legal solutions

Procedia PDF Downloads 61
1080 Unfolding Prison Crisis in India: An Evaluation from a Human Rights Perspective

Authors: Sharmila Sakravarthy

Abstract:

Prison administration in India, even though an important limb of the criminal justice system are worse off in terms of overcrowding, prolonged detention of under-trial prisoners, and a host of other problems. Considering the statistics of the prison population, over a thousand three hundred prisons across the country were overcrowded, even to the extent of more than six hundred percent. A total of eighteen thousand eight hundred and fifty-eight female prisoners were in India, out of which thirteen thousand hundred and sixty-five were under trials and five thousand and sixty-three convicts. A total of around one thousand seven hundred thirty-five children are residing in prisons along with their mothers. District prisons are more overcrowded than the other prisons, and their practices are at odd with human rights standards. This article examines a range of issues in prisons throughout India including pretrial detention, overcrowding, resources and governance, women and children in prison and rehabilitation. A substantial amount of space is devoted to the reforms that are occurring across the nation, and recommendations are made with regard to what further reforms are necessary.

Keywords: human rights, overcrowding, prisons, rehabilitation

Procedia PDF Downloads 104
1079 Monte Carlo Simulations of LSO/YSO for Dose Evaluation in Photon Beam Radiotherapy

Authors: H. Donya

Abstract:

Monte Carlo (MC) techniques play a fundamental role in radiotherapy. A two non-water-equivalent of different media were used to evaluate the dose in water. For such purpose, Lu2SiO5 (LSO) and Y2SiO5 (YSO) orthosilicates scintillators are chosen for MC simulation using Penelope code. To get higher efficiency in dose calculation, variance reduction techniques are discussed. Overall results of this investigation ensured that the LSO/YSO bi-media a good combination to tackle over-response issue in dynamic photon radiotherapy.

Keywords: Lu2SiO5 (LSO) and Y2SiO5 (YSO) orthosilicates, Monte Carlo, correlated sampling, radiotherapy

Procedia PDF Downloads 388
1078 Face Tracking and Recognition Using Deep Learning Approach

Authors: Degale Desta, Cheng Jian

Abstract:

The most important factor in identifying a person is their face. Even identical twins have their own distinct faces. As a result, identification and face recognition are needed to tell one person from another. A face recognition system is a verification tool used to establish a person's identity using biometrics. Nowadays, face recognition is a common technique used in a variety of applications, including home security systems, criminal identification, and phone unlock systems. This system is more secure because it only requires a facial image instead of other dependencies like a key or card. Face detection and face identification are the two phases that typically make up a human recognition system.The idea behind designing and creating a face recognition system using deep learning with Azure ML Python's OpenCV is explained in this paper. Face recognition is a task that can be accomplished using deep learning, and given the accuracy of this method, it appears to be a suitable approach. To show how accurate the suggested face recognition system is, experimental results are given in 98.46% accuracy using Fast-RCNN Performance of algorithms under different training conditions.

Keywords: deep learning, face recognition, identification, fast-RCNN

Procedia PDF Downloads 128
1077 Experimental and Numerical Modeling of Dynamic Axial Crushing of a Composite Glass/PEHD

Authors: Mahmoudi Noureddine, Kaou Abdellah

Abstract:

Energy absorption is a major requirement for automotive structures. Although crashworthy structures of composite based glass fiber have exhibited energy absorption greater than similar at other composites structures, the crush process in many cases is accompanied by fracture, rather than by plastic deformation. The crash experiments show that the tubes are crushed in progressive manner start from one end of the tubes and delamination takes place between the layers. To better understand details of the crash process, ABAQUS finite element code is used.

Keywords: Energy absorption, crash, PEHD

Procedia PDF Downloads 488
1076 Rapid Method for the Determination of Acid Dyes by Capillary Electrophoresis

Authors: Can Hu, Huixia Shi, Hongcheng Mei, Jun Zhu, Hongling Guo

Abstract:

Textile fibers are important trace evidence and frequently encountered in criminal investigations. A significant aspect of fiber evidence examination is the determination of fiber dyes. Although several instrumental methods have been developed for dyes detection, the analysis speed is not fast enough yet. A rapid dye analysis method is still needed to further improve the efficiency of case handling. Capillary electrophoresis has the advantages of high separation speed and high separation efficiency and is an ideal method for the rapid analysis of fiber dyes. In this paper, acid dyes used for protein fiber dyeing were determined by a developed short-end injection capillary electrophoresis technique. Five acid red dyes with similar structures were successfully baseline separated within 5 min. The separation reproducibility is fairly good for the relative standard deviation of retention time is 0.51%. The established method is rapid and accurate which has great potential to be applied in forensic setting.

Keywords: acid dyes, capillary electrophoresis, fiber evidence, rapid determination

Procedia PDF Downloads 133
1075 Modified InVEST for Whatsapp Messages Forensic Triage and Search through Visualization

Authors: Agria Rhamdhan

Abstract:

WhatsApp as the most popular mobile messaging app has been used as evidence in many criminal cases. As the use of mobile messages generates large amounts of data, forensic investigation faces the challenge of large data problems. The hardest part of finding this important evidence is because current practice utilizes tools and technique that require manual analysis to check all messages. That way, analyze large sets of mobile messaging data will take a lot of time and effort. Our work offers methodologies based on forensic triage to reduce large data to manageable sets resulting easier to do detailed reviews, then show the results through interactive visualization to show important term, entities and relationship through intelligent ranking using Term Frequency-Inverse Document Frequency (TF-IDF) and Latent Dirichlet Allocation (LDA) Model. By implementing this methodology, investigators can improve investigation processing time and result's accuracy.

Keywords: forensics, triage, visualization, WhatsApp

Procedia PDF Downloads 161
1074 Statistical Models and Time Series Forecasting on Crime Data in Nepal

Authors: Dila Ram Bhandari

Abstract:

Throughout the 20th century, new governments were created where identities such as ethnic, religious, linguistic, caste, communal, tribal, and others played a part in the development of constitutions and the legal system of victim and criminal justice. Acute issues with extremism, poverty, environmental degradation, cybercrimes, human rights violations, crime against, and victimization of both individuals and groups have recently plagued South Asian nations. Everyday massive number of crimes are steadfast, these frequent crimes have made the lives of common citizens restless. Crimes are one of the major threats to society and also for civilization. Crime is a bone of contention that can create a societal disturbance. The old-style crime solving practices are unable to live up to the requirement of existing crime situations. Crime analysis is one of the most important activities of the majority of intelligent and law enforcement organizations all over the world. The South Asia region lacks such a regional coordination mechanism, unlike central Asia of Asia Pacific regions, to facilitate criminal intelligence sharing and operational coordination related to organized crime, including illicit drug trafficking and money laundering. There have been numerous conversations in recent years about using data mining technology to combat crime and terrorism. The Data Detective program from Sentient as a software company, uses data mining techniques to support the police (Sentient, 2017). The goals of this internship are to test out several predictive model solutions and choose the most effective and promising one. First, extensive literature reviews on data mining, crime analysis, and crime data mining were conducted. Sentient offered a 7-year archive of crime statistics that were daily aggregated to produce a univariate dataset. Moreover, a daily incidence type aggregation was performed to produce a multivariate dataset. Each solution's forecast period lasted seven days. Statistical models and neural network models were the two main groups into which the experiments were split. For the crime data, neural networks fared better than statistical models. This study gives a general review of the applied statistics and neural network models. A detailed image of each model's performance on the available data and generalizability is provided by a comparative analysis of all the models on a comparable dataset. Obviously, the studies demonstrated that, in comparison to other models, Gated Recurrent Units (GRU) produced greater prediction. The crime records of 2005-2019 which was collected from Nepal Police headquarter and analysed by R programming. In conclusion, gated recurrent unit implementation could give benefit to police in predicting crime. Hence, time series analysis using GRU could be a prospective additional feature in Data Detective.

Keywords: time series analysis, forecasting, ARIMA, machine learning

Procedia PDF Downloads 154
1073 Public-Private Partnership for Better Protection of Trafficked Victims in Thailand: Case Study on Public Protection and Welfare Center in Cooperation with Jim Thompson Foundation in Occupational Development on Silk Sewing and Tailoring

Authors: Aungkana Kmonpetch

Abstract:

Protection of trafficked victims and partnership among stakeholders are established as core principles in 5P’ strategies in international and national anti-human trafficking policies. In this article, it is of interest to discuss how the role of public-private partnerships in promoting the occupation development for employment in wage will enhance the better protection for victims of trafficking who affirmatively decide they want a criminal justice intervention, using Thailand as a case. Most of the victims who have accepted to be witness in the criminal justice system have lost income during their absence from work. The analysis of Thailand case is based on two methodological approaches: 1) interview with victims of trafficking, protection authorities, service providers, trainers and teachers, social workers, NGOs, police, prosecutors, business owners and enterprises, ILO, UNDP etc.; 2) create collaborative effort through workshops/consultation meetings in participation of all stakeholders – governmental agencies, private organizations, UN and international agencies. The linking of protection and partnership is anchored in international conventions and human trafficking directives. While this is actually framed as a responsive advantage for 5P strategies of anti-human trafficking – prevention, protection, persecution, punishment, and partnership, in reality, there might have more practical requirements of care and support. The article addresses how the partnership between governmental agencies and private organizations provide opportunities for trafficked victims to engage in high-skilled occupational development such as Silk-Sewing and Tailoring. The discussion is also focused how this approach of capacity building of the trainer for trainee, be enable the trafficked victims to cultivate the practices of high-skilled training to engage them into the business of social enterprise with employment in wage. The partnership coordination draws specifically to two aspects: firstly, to formulate appropriate assistance for promotion and protection of human rights of the trafficked victims in response to the 5P’ strategies of anti-human trafficking policy; secondly, to empower them to settle some economic stability for livelihood opportunity in the country of origin on their return and reintegration. Therefore, they can define how they want to move forward to prevent them at risk of vulnerable situations where they might being trafficked again or going on to work in exploitative conditions. It strengthens proper access to protection and assistance, depending on how the incentive of protection for cooperation is perceived to be and how useful the capacity building in occupation development for employment in wage will be implemented practically both in the host country and in the country of origin. This also brings into question how the victim of trafficking are able to access to the trade of market and are supported the employment opportunity according to the concept of decent work as they are constituted as witnesses. We discuss these issues in the area of a broader literature on social protection, economic security, gender, law, and victimhood.

Keywords: employment opportunity, occupation development, protection for victim of trafficking, public-private partnership

Procedia PDF Downloads 217