Search results for: legal text understanding
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8916

Search results for: legal text understanding

8826 Food Consumer Protection in Moroccan Legal System: A Systematic Review

Authors: Bouchaib Gazzaz, Mounir Mehdi

Abstract:

In order to ensure consumer food protection, the food industry has a legal obligation to provide food products that comply with the requirements of the legislation in force. National regulations in this area occupy an important place in the food control system in terms of consumer protection. This article discusses the legal and regulatory framework of food safety and consumer protection in Moroccan law. We used the doctrinal research approach by analyzing the judicial normative and bibliographic legal research. As a result, we were able to present the basic principles of consumer food protection by showing to what extent the food safety law provides effective consumer protection in Morocco. We have concluded that there is an impact -in terms of consumer legal protection- of food law reform on the concept of food safety.

Keywords: food safety, Morocco, consumer protection, framework, food law

Procedia PDF Downloads 180
8825 Text as Reader Device Improving Subjectivity on the Role of Attestation between Interpretative Semiotics and Discursive Linguistics

Authors: Marco Castagna

Abstract:

Proposed paper is aimed to inquire about the relation between text and reader, focusing on the concept of ‘attestation’. Indeed, despite being widely accepted in semiotic research, even today the concept of text remains uncertainly defined. So, it seems to be undeniable that what is called ‘text’ offers an image of internal cohesion and coherence, that makes it possible to analyze it as an object. Nevertheless, this same object remains problematic when it is pragmatically activated by the act of reading. In fact, as for the T.A.R:D.I.S., that is the unique space-temporal vehicle used by the well-known BBC character Doctor Who in his adventures, every text appears to its own readers not only “bigger inside than outside”, but also offering spaces that change according to the different traveller standing in it. In a few words, as everyone knows, this singular condition raises the questions about the gnosiological relation between text and reader. How can a text be considered the ‘same’, even if it can be read in different ways by different subjects? How can readers can be previously provided with knowledge required for ‘understanding’ a text, but at the same time learning something more from it? In order to explain this singular condition it seems useful to start thinking about text as a device more than an object. In other words, this unique status is more clearly understandable when ‘text’ ceases to be considered as a box designed to move meaning from a sender to a recipient (marking the semiotic priority of the “code”) and it starts to be recognized as performative meaning hypothesis, that is discursively configured by one or more forms and empirically perceivable by means of one or more substances. Thus, a text appears as a “semantic hanger”, potentially offered to the “unending deferral of interpretant", and from time to time fixed as “instance of Discourse”. In this perspective, every reading can be considered as an answer to the continuous request for confirming or denying the meaning configuration (the meaning hypothesis) expressed by text. Finally, ‘attestation’ is exactly what regulates this dynamic of request and answer, through which the reader is able to confirm his previous hypothesis on reality or maybe acquire some new ones.Proposed paper is aimed to inquire about the relation between text and reader, focusing on the concept of ‘attestation’. Indeed, despite being widely accepted in semiotic research, even today the concept of text remains uncertainly defined. So, it seems to be undeniable that what is called ‘text’ offers an image of internal cohesion and coherence, that makes it possible to analyze it as an object. Nevertheless, this same object remains problematic when it is pragmatically activated by the act of reading. In fact, as for the T.A.R:D.I.S., that is the unique space-temporal vehicle used by the well-known BBC character Doctor Who in his adventures, every text appears to its own readers not only “bigger inside than outside”, but also offering spaces that change according to the different traveller standing in it. In a few words, as everyone knows, this singular condition raises the questions about the gnosiological relation between text and reader. How can a text be considered the ‘same’, even if it can be read in different ways by different subjects? How can readers can be previously provided with knowledge required for ‘understanding’ a text, but at the same time learning something more from it? In order to explain this singular condition it seems useful to start thinking about text as a device more than an object. In other words, this unique status is more clearly understandable when ‘text’ ceases to be considered as a box designed to move meaning from a sender to a recipient (marking the semiotic priority of the “code”) and it starts to be recognized as performative meaning hypothesis, that is discursively configured by one or more forms and empirically perceivable by means of one or more substances. Thus, a text appears as a “semantic hanger”, potentially offered to the “unending deferral of interpretant", and from time to time fixed as “instance of Discourse”. In this perspective, every reading can be considered as an answer to the continuous request for confirming or denying the meaning configuration (the meaning hypothesis) expressed by text. Finally, ‘attestation’ is exactly what regulates this dynamic of request and answer, through which the reader is able to confirm his previous hypothesis on reality or maybe acquire some new ones.

Keywords: attestation, meaning, reader, text

Procedia PDF Downloads 218
8824 N400 Investigation of Semantic Priming Effect to Symbolic Pictures in Text

Authors: Thomas Ousterhout

Abstract:

The purpose of this study was to investigate if incorporating meaningful pictures of gestures and facial expressions in short sentences of text could supplement the text with enough semantic information to produce and N400 effect when probe words incongruent to the picture were subsequently presented. Event-related potentials (ERPs) were recorded from a 14-channel commercial grade EEG headset while subjects performed congruent/incongruent reaction time discrimination tasks. Since pictures of meaningful gestures have been shown to be semantically processed in the brain in a similar manner as words are, it is believed that pictures will add supplementary information to text just as the inclusion of their equivalent synonymous word would. The hypothesis is that when subjects read the text/picture mixed sentences, they will process the images and words just like in face-to-face communication and therefore probe words incongruent to the image will produce an N400.

Keywords: EEG, ERP, N400, semantics, congruency, facilitation, Emotiv

Procedia PDF Downloads 238
8823 Electroencephalogram during Natural Reading: Theta and Alpha Rhythms as Analytical Tools for Assessing a Reader’s Cognitive State

Authors: D. Zhigulskaya, V. Anisimov, A. Pikunov, K. Babanova, S. Zuev, A. Latyshkova, K. Сhernozatonskiy, A. Revazov

Abstract:

Electrophysiology of information processing in reading is certainly a popular research topic. Natural reading, however, has been relatively poorly studied, despite having broad potential applications for learning and education. In the current study, we explore the relationship between text categories and spontaneous electroencephalogram (EEG) while reading. Thirty healthy volunteers (mean age 26,68 ± 1,84) participated in this study. 15 Russian-language texts were used as stimuli. The first text was used for practice and was excluded from the final analysis. The remaining 14 were opposite pairs of texts in one of 7 categories, the most important of which were: interesting/boring, fiction/non-fiction, free reading/reading with an instruction, reading a text/reading a pseudo text (consisting of strings of letters that formed meaningless words). Participants had to read the texts sequentially on an Apple iPad Pro. EEG was recorded from 12 electrodes simultaneously with eye movement data via ARKit Technology by Apple. EEG spectral amplitude was analyzed in Fz for theta-band (4-8 Hz) and in C3, C4, P3, and P4 for alpha-band (8-14 Hz) using the Friedman test. We found that reading an interesting text was accompanied by an increase in theta spectral amplitude in Fz compared to reading a boring text (3,87 µV ± 0,12 and 3,67 µV ± 0,11, respectively). When instructions are given for reading, we see less alpha activity than during free reading of the same text (3,34 µV ± 0,20 and 3,73 µV ± 0,28, respectively, for C4 as the most representative channel). The non-fiction text elicited less activity in the alpha band (C4: 3,60 µV ± 0,25) than the fiction text (C4: 3,66 µV ± 0,26). A significant difference in alpha spectral amplitude was also observed between the regular text (C4: 3,64 µV ± 0,29) and the pseudo text (C4: 3,38 µV ± 0,22). These results suggest that some brain activity we see on EEG is sensitive to particular features of the text. We propose that changes in theta and alpha bands during reading may serve as electrophysiological tools for assessing the reader’s cognitive state as well as his or her attitude to the text and the perceived information. These physiological markers have prospective practical value for developing technological solutions and biofeedback systems for reading in particular and for education in general.

Keywords: EEG, natural reading, reader's cognitive state, theta-rhythm, alpha-rhythm

Procedia PDF Downloads 59
8822 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases

Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee

Abstract:

Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.

Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements

Procedia PDF Downloads 204
8821 Literature Review on Text Comparison Techniques: Analysis of Text Extraction, Main Comparison and Visual Representation Tools

Authors: Andriana Mkrtchyan, Vahe Khlghatyan

Abstract:

The choice of a profession is one of the most important decisions people make throughout their life. With the development of modern science, technologies, and all the spheres existing in the modern world, more and more professions are being arisen that complicate even more the process of choosing. Hence, there is a need for a guiding platform to help people to choose a profession and the right career path based on their interests, skills, and personality. This review aims at analyzing existing methods of comparing PDF format documents and suggests that a 3-stage approach is implemented for the comparison, that is – 1. text extraction from PDF format documents, 2. comparison of the extracted text via NLP algorithms, 3. comparison representation using special shape and color psychology methodology.

Keywords: color psychology, data acquisition/extraction, data augmentation, disambiguation, natural language processing, outlier detection, semantic similarity, text-mining, user evaluation, visual search

Procedia PDF Downloads 44
8820 Legal Feminism, Modernity and Their Impact on Some African Countries

Authors: Umulisa Linda, Andy Cons Matata

Abstract:

The origin of legal feminism can be attributed to an attempt to provide a safe space for women such as voting, parental, and inheritance rights, among others. It was also a rebellion against male supremacy. However, with the development of technology and especially in the era of the internet, it appears that both legal feminism and the modernism are losing their luster. While these movements had their origin either in the United States of America or western Europe, their impacts have been felt as far as Africa, Asia, and Latin America. In Africa, different countries have different levels of penetration of these movements. This study, therefore, had its focus on how legal feminism and modernism have influenced legal developments in Kenya and Rwanda. The study adopted a qualitative approach with the respondents being asked about their feelings and perceptions on how the two movements had affected legal developments in their countries. In order to gauge the opinion of different categories of people such as the youth, middle-aged and the elderly people as well as being gender-sensitive, the study adopted a purpose method of sampling. The questionnaires and the focus group discussions were employed as the main tools for data gathering. From the questionnaires, the focus group discussions, and the data analysis that followed, the study concluded that both legal feminism and modernity had penetrated the legal systems of both Kenya and Rwanda so deeply. The study further found that the proponents of the two movements were mostly urban based and educated women. The men were generally opposed to the movements.

Keywords: legal development, legal feminsim, modernism, voting, parental and inheritance rights

Procedia PDF Downloads 114
8819 Interactive, Topic-Oriented Search Support by a Centroid-Based Text Categorisation

Authors: Mario Kubek, Herwig Unger

Abstract:

Centroid terms are single words that semantically and topically characterise text documents and so may serve as their very compact representation in automatic text processing. In the present paper, centroids are used to measure the relevance of text documents with respect to a given search query. Thus, a new graphbased paradigm for searching texts in large corpora is proposed and evaluated against keyword-based methods. The first, promising experimental results demonstrate the usefulness of the centroid-based search procedure. It is shown that especially the routing of search queries in interactive and decentralised search systems can be greatly improved by applying this approach. A detailed discussion on further fields of its application completes this contribution.

Keywords: search algorithm, centroid, query, keyword, co-occurrence, categorisation

Procedia PDF Downloads 256
8818 Binarization and Recognition of Characters from Historical Degraded Documents

Authors: Bency Jacob, S.B. Waykar

Abstract:

Degradations in historical document images appear due to aging of the documents. It is very difficult to understand and retrieve text from badly degraded documents as there is variation between the document foreground and background. Thresholding of such document images either result in broken characters or detection of false texts. Numerous algorithms exist that can separate text and background efficiently in the textual regions of the document; but portions of background are mistaken as text in areas that hardly contain any text. This paper presents a way to overcome these problems by a robust binarization technique that recovers the text from a severely degraded document images and thereby increases the accuracy of optical character recognition systems. The proposed document recovery algorithm efficiently removes degradations from document images. Here we are using the ostus method ,local thresholding and global thresholding and after the binarization training and recognizing the characters in the degraded documents.

Keywords: binarization, denoising, global thresholding, local thresholding, thresholding

Procedia PDF Downloads 314
8817 The Need for a More Robust Legal Framework to Curb the Rise in Violence against Game Officials

Authors: A. Roomy

Abstract:

The dramatic rise in violence against game officials has affected all levels of sports including recreational, amateur, and professional sports. One way to combat this rise in violence is through the creation of laws specifically aimed at preventing and punishing this kind of violence. This paper will use related legal cases as a starting point to explore possible ways of better protecting the safety of game officials. It will do this by looking at relevant cases, related legal issues, and two specific ways of reducing violence against game officials. In closing, it will be argued that there needs to be a more robust legal approach with emphasis on criminal and civil penalties for assault and battery, and a more comprehensive social approach with emphasis on raising social awareness on the need to protect game officials from violence.

Keywords: game officials, legal issues, safety, violence

Procedia PDF Downloads 352
8816 Adaptation of Projection Profile Algorithm for Skewed Handwritten Text Line Detection

Authors: Kayode A. Olaniyi, Tola. M. Osifeko, Adeola A. Ogunleye

Abstract:

Text line segmentation is an important step in document image processing. It represents a labeling process that assigns the same label using distance metric probability to spatially aligned units. Text line detection techniques have successfully been implemented mainly in printed documents. However, processing of the handwritten texts especially unconstrained documents has remained a key problem. This is because the unconstrained hand-written text lines are often not uniformly skewed. The spaces between text lines may not be obvious, complicated by the nature of handwriting and, overlapping ascenders and/or descenders of some characters. Hence, text lines detection and segmentation represents a leading challenge in handwritten document image processing. Text line detection methods that rely on the traditional global projection profile of the text document cannot efficiently confront with the problem of variable skew angles between different text lines. Hence, the formulation of a horizontal line as a separator is often not efficient. This paper presents a technique to segment a handwritten document into distinct lines of text. The proposed algorithm starts, by partitioning the initial text image into columns, across its width into chunks of about 5% each. At each vertical strip of 5%, the histogram of horizontal runs is projected. We have worked with the assumption that text appearing in a single strip is almost parallel to each other. The algorithm developed provides a sliding window through the first vertical strip on the left side of the page. It runs through to identify the new minimum corresponding to a valley in the projection profile. Each valley would represent the starting point of the orientation line and the ending point is the minimum point on the projection profile of the next vertical strip. The derived text-lines traverse around any obstructing handwritten vertical strips of connected component by associating it to either the line above or below. A decision of associating such connected component is made by the probability obtained from a distance metric decision. The technique outperforms the global projection profile for text line segmentation and it is robust to handle skewed documents and those with lines running into each other.

Keywords: connected-component, projection-profile, segmentation, text-line

Procedia PDF Downloads 96
8815 Juridically Secure Trade Mechanisms for Alternative Dispute Resolution in Transnational Business Negotiations

Authors: Linda Frazer

Abstract:

A pluralistic methodology focuses on promoting an understanding that an alternative juridical framework for the regulation of transnational business negotiations (TBN) between private business parties is fundamentally required. This paper deals with the evolving assessment of the doctoral research of the author which demonstrated that due to insufficient juridical tools, negotiations are commonly misunderstood within the complexity of pluralistic and conflicting legal regimes. This inadequacy causes uncertainty in the enforcement of legal remedies, leaving business parties surprised. Consequently, parties cannot sufficiently anticipate when and how legal rights and obligations are created, often counting on oral or incomplete agreements which may lead to the misinterpretation of the extent of their legal rights and obligations. This uncertainty causes threats to business parties for fear of creating unintended legal obligations or, conversely, that law will not enforce intended agreements for failure to pass the tests of contractual validity. A need to find a manner to set default standards of communications and standards of conduct to monitor our evolving global trade would aid law to provide the security, predictability and foreseeability during alternative dispute resolution required by TBN parties. The conclusion of this study includes a proposal of new trade mechanisms, termed 'Bills of Negotiations' (BON) to enhance party autonomy and promote the ability for TBN parties to self-regulate within the boundaries of law. BON will be guided by a secure juridical institutionalized setting that caters to guiding communications during TBN and resolving disputes that arise along the negotiation processes on a fast track basis.

Keywords: alternative resolution disputes, ADR, good faith, good faith, juridical security, legal regulation, trade mechanisms, transnational business negotiations

Procedia PDF Downloads 121
8814 The Right to a Fair Trial in French and Spanish Constitutional Law

Authors: Chloe Fauchon

Abstract:

In Europe, the right to a fair trial is enshrined in the European Convention on Human Rights, signed in 1950, in its famous Article 6, and, in the field of the European Union, in Article 47 of the Charter of Fundamental Rights, binding since 2009. The right to a fair trial is, therefore, a fundamental right protected by all the relevant treaties. The right to a fair trial is an "umbrella right" which encompasses various sub-rights and principles. Although this right applies in all the proceedings, it gets a special relevance in criminal matters and, particularly, regarding the defendant. In criminal proceedings, the parties are not equal: the accusation is represented by a State-organ, with specific prerogatives, and the defense does not benefit from these specific powers and is often inexperienced in criminal law. Equality of arms, and consequently the right to a fair trial, needs some specific mechanisms to be effective in criminal proceedings. For instance, the defendant benefits from some procedural rights, such as the right to a lawyer, the right to be informed of the charges against them, the right to confront witnesses, and so on. These rights aim to give the defendant the tools to dispute the accusation. The role of the defense is, therefore, very important in criminal matters to avoid unjustified convictions. This specificity of criminal matters justifies that the focus will be put on them during this study. Then this paper will also focus on French and Spanish legal orders. Indeed, if the European Court and Convention on Human Rights are the most famous instruments to protect the right to a fair trial, this right is also guaranteed at a constitutional level in European national legal orders in Europe. However, this enshrinement differs from one country to the other: for instance, in Spain, the right to a fair trial is protected explicitly by the 1978 constitutional text, whereas, in France, it is more of a case-law construction. Nevertheless, this difference between both legal orders does not imply huge variations in the substantive aspect of the right to a fair trial. This can be specifically explained by the submission of both States to the European Convention on Human Rights. This work aims to show that, although the French and Spanish legal orders differ in the way they protect the right to a fair trial, this right eventually has the same substantive meaning in both legal orders.

Keywords: right to a fair trial, constitutional law, French law, Spanish law, European Court of Human Rights

Procedia PDF Downloads 36
8813 Activation of Google Classroom Features to Engage Introvert Students in Comprehensible Output

Authors: Raghad Dwaik

Abstract:

It is well known in language acquisition literature that a mere understanding of a reading text is not enough to help students build proficiency in comprehension. Students should rather follow understanding by attempting to express what has been understood by pushing their competence to the limit. Learners' attempt to push their competence was given the term "comprehensible output" by Swain (1985). Teachers in large classes, however, find it sometimes difficult to give all students a chance to communicate their views or to share their ideas during the short class time. In most cases, students who are outgoing dominate class discussion and get more opportunities for practice which leads to ignoring the shy students totally while helping the good ones become better. This paper presents the idea of using Google Classroom features of posting and commenting to allow students who hesitate to participate in class discussions about a reading text to write their views on the wall of a Google Classroom and share them later after they have received feedback and comments from classmates. Such attempts lead to developing their proficiency through additional practice in comprehensible output and to enhancing their confidence in themselves and their views. It was found that virtual classroom interaction would help students maintain vocabulary, use more complex structures and focus on meaning besides form.

Keywords: learning groups, reading TESOL, Google Classroom, comprehensible output

Procedia PDF Downloads 43
8812 The Principle of the Protection of Legitimate Expectation: Analysis the Adjudications of Thailand Court

Authors: Paiboon Chuwatthanakij

Abstract:

In reference to the legal state in the Thai legal system, most people understand the minor principles of the legal state form, which are the principles that can be explained and understood easily and the results can be seen clearly, especially in the legitimacy of administrative acts. Therefore, there is no awareness of justice, which is the fundamental value of Thai law. The legitimacy of administrative acts requires the administration to adhere to the constitution and legislative laws in enforcement of the laws. If it appears that the administrative acts are illegitimate, the administrative court, as the court of justice, will revoke those acts as if they had never been set in the legal system, this will affect people’s trust as they are unaware as to whether the administrative acts that appoint their lives are legitimate or not. Regarding the revocation of administrative orders by the administrative court as if those orders had never existed, the common individual surely cannot be expected to comprehend the security of their juristic position. Therefore, the legal state does not require a revocation of the government’s acts to terminate its legal results merely because those acts are illegitimate, but there should be considerations and realizations regarding the “The Principle of the Protection of Legitimate Expectation,” which is a minor principle in the legal state’s content that focuses on supporting and protecting legitimate expectations of the juristic position of an individual and maintaining justice, which is the fundamental value of Thai law

Keywords: legal state, rule of law, protection of legitimate, adjudication

Procedia PDF Downloads 368
8811 Glossematics and Textual Structure

Authors: Abdelhadi Nadjer

Abstract:

The structure of the text to the systemic school -(glossématique-Helmslev). At the beginning of the note we have a cursory look around the concepts of general linguistics The science that studies scientific study of human language based on the description and preview the facts away from the trend of education than we gave a detailed overview the founder of systemic school and most important customers and more methods and curriculum theory and analysis they extend to all humanities, practical action each offset by a theoretical and the procedure can be analyzed through the elements that pose as another method we talked to its links with other language schools where they are based on the sharp criticism of the language before and deflected into consideration for the field of language and its erection has outside or language network and its participation in the actions (non-linguistic) and after that we started our Valglosamatik analytical structure of the text is ejected text terminal or all of the words to was put for expression. This text Negotiable divided into types in turn are divided into classes and class should not be carrying a contradiction and be inclusive. It is on the same materials as described relationships that combine language and seeks to describe their relations and identified.

Keywords: text, language schools, linguistics, human language

Procedia PDF Downloads 431
8810 We Wonder If They Mind: An Empirical Inquiry into the Narratological Function of Mind Wandering in Readers of Literary Texts

Authors: Tina Ternes, Florian Kleinau

Abstract:

The study investigates the content and triggers of mind wandering (MW) in readers of fictional texts. It asks whether readers’ MW is productive (text-related) or unproductive (text-unrelated). Methodologically, it bridges the gap between narratological and data-driven approaches by utilizing a sentence-by-sentence self-paced reading paradigm combined with thought probes in the reading of an excerpt of A. L. Kennedy’s “Baby Blue”. Results show that the contents of MW can be linked to text properties. We validated the role of self-reference in MW and found prediction errors to be triggers of MW. Results also indicate that the content of MW often travels along the lines of the text at hand and can thus be viewed as productive and integral to interpretation.

Keywords: narratology, mind wandering, reading fiction, meta cognition

Procedia PDF Downloads 56
8809 Problems concerning Legal Regulation of Electronic Governance in Georgia

Authors: Giga Phartenadze

Abstract:

In the legal framework of regulation of electronic governance, those norms are considered which include measures for improvement of functions of public institutions and a complex of actions for raising their standard such as websites of public institutions, online services, some forms of internet interactions and higher level of internet services. An important legal basis for electronic governance in Georgia is Georgian Law about Electronic Communications which defines legal and economic basis for utilizing electronic communication systems in Georgia. As for single electronic basis for e-governance regulation, it can be said that it does not exist at all. The official websites of public institutions do not have standards for proactive spreading of information. At the same time, there is no common legal norm which would make all public institutions have an official website for public relations, accountability, publicity, and raising information quality. Electronic governance in Georgia needs comprehensive legal regulation. Public administration in electronic form is on the initial stage of development. Currently existing legal basis has a low quality for public institutions and officials as well as citizens and business. Services of e-involvement and e-consultation have also low quality. So far there is no established legal framework for e-governance. Therefore, a single legislative system of e-governance should be created which will help develop effective, comprehensive and multi component electronic systems in the country (central, regional, local levels). Such comprehensive legal framework will provide relevant technological, institutional, and informational conditions.

Keywords: law, e-government, public administration, Georgia

Procedia PDF Downloads 291
8808 Incorporating Information Gain in Regular Expressions Based Classifiers

Authors: Rosa L. Figueroa, Christopher A. Flores, Qing Zeng-Treitler

Abstract:

A regular expression consists of sequence characters which allow describing a text path. Usually, in clinical research, regular expressions are manually created by programmers together with domain experts. Lately, there have been several efforts to investigate how to generate them automatically. This article presents a text classification algorithm based on regexes. The algorithm named REX was designed, and then, implemented as a simplified method to create regexes to classify Spanish text automatically. In order to classify ambiguous cases, such as, when multiple labels are assigned to a testing example, REX includes an information gain method Two sets of data were used to evaluate the algorithm’s effectiveness in clinical text classification tasks. The results indicate that the regular expression based classifier proposed in this work performs statically better regarding accuracy and F-measure than Support Vector Machine and Naïve Bayes for both datasets.

Keywords: information gain, regular expressions, smith-waterman algorithm, text classification

Procedia PDF Downloads 294
8807 Honour Killing in Iraqi Statutory Law

Authors: Hersh Azeez

Abstract:

Honour killing, also known as "honor killing," is a deeply rooted and complex social issue that persists in many parts of the world, including Iraq. This paper seeks to examine the legal framework surrounding honour killing in Iraqi statutory law. The paper begins with an introduction to honour killing as a phenomenon and its cultural and societal context in Iraq. It then delves into the methodology used in this research, including a comprehensive review of relevant legal texts, case studies, and scholarly articles. The paper analyzes the existing legal framework in Iraq, including relevant penal code provisions and other relevant legislation, as well as the challenges and shortcomings in addressing honour killing in the country. The research findings reveal that despite some legal provisions aimed at addressing honour killing, the practice continues to persist due to a lack of effective implementation, societal norms, and cultural attitudes. The paper concludes with recommendations for improving the legal framework to combat honour killing in Iraq, including legal reforms, education and awareness campaigns, and cultural change initiatives.

Keywords: honour killing, Iraq, statutory law, legal framework, penal code, cultural norms

Procedia PDF Downloads 41
8806 The Application of Cognitive Linguistics to Teaching EFL Students to Understand Spoken Coinages: Based on an Experiment with Speakers of Russian

Authors: Ekaterina Lukianchenko

Abstract:

The present article addresses the nuances of teaching English vocabulary to Russian-speaking students. The experiment involving 39 participants aged 17 to 21 proves that the key to understanding spoken coinages is not only the knowledge of their constituents, but rather the understanding of the context and co-text. The volunteers who took part knew the constituents, but did not know the meaning of the words. The assumption of the authors consists in the fact that the structure of the concept has a direct relation with the form of the particular vocabulary unit, but its form is secondary to its meaning, if the word is a spoken coinage, which is partly proved by the fact that in modern slang words have multiple meanings, as well as one notion can have various embodiments that have virtually nothing in common. The choice of vocabulary items that youngsters use is not exactly arbitrary, but, even if complex nominals are taken into consideration, whose meaning seems clear, as it looks like a sum of their constituents’ meanings, they are still impossible to understand without any context or co-text, as a lot of them are idiomatic, non-transparent. It is further explained what methods might be effective in teaching students how to deal with new words they encounter in real-life situations and how student’s knowledge of vocabulary might be enhanced.

Keywords: spoken language, cognitive linguistics, complex nominals, nominals with the incorporated object, concept, EFL, communicative language teaching

Procedia PDF Downloads 253
8805 Problems of the Management of Legal Entities of Private Law in Georgia

Authors: Ketevan Kokrashvili, Rusudan Kutateladze, Nino Pailodze

Abstract:

Importance of management of legal entities under private law of which especially corporate management, as well as looking for ways of its improvement and perfection has become especially relevant in the twenty-first century, which was greatly contributed to by the global economic crisis. Some states have adopted Corporate Governance Codes; the European Union has set to work on a series of directives the main purpose of which is an improvement of corporate governance, provision of greater transparency and implementation of an effective control mechanism. This process is not yet completed, and various problematic issues associated with management of legal persons are still being debated among practitioner experts and scholars. Georgia is not an exception in this regard. The article discusses the legislative gaps, and in some cases, discrepancies having arisen in legal relationships under private law and having caused many practical problems. This especially applies to the management of capital companies.

Keywords: business entities, corporate management, capital public management, existing problems, legal discrepancies

Procedia PDF Downloads 260
8804 Multi-Class Text Classification Using Ensembles of Classifiers

Authors: Syed Basit Ali Shah Bukhari, Yan Qiang, Saad Abdul Rauf, Syed Saqlaina Bukhari

Abstract:

Text Classification is the methodology to classify any given text into the respective category from a given set of categories. It is highly important and vital to use proper set of pre-processing , feature selection and classification techniques to achieve this purpose. In this paper we have used different ensemble techniques along with variance in feature selection parameters to see the change in overall accuracy of the result and also on some other individual class based features which include precision value of each individual category of the text. After subjecting our data through pre-processing and feature selection techniques , different individual classifiers were tested first and after that classifiers were combined to form ensembles to increase their accuracy. Later we also studied the impact of decreasing the classification categories on over all accuracy of data. Text classification is highly used in sentiment analysis on social media sites such as twitter for realizing people’s opinions about any cause or it is also used to analyze customer’s reviews about certain products or services. Opinion mining is a vital task in data mining and text categorization is a back-bone to opinion mining.

Keywords: Natural Language Processing, Ensemble Classifier, Bagging Classifier, AdaBoost

Procedia PDF Downloads 208
8803 The Arab Spring Rebellion or Revolution: An Analysis of the Text

Authors: Sulaiman Ahmed

Abstract:

This paper will analyse the classical Islamic text in order to determine whether the Arab spring was a rebellion or a revolution. Commencing in 2010, we saw a series of revolutions or what some would call rebellions throughout the Arab peninsula. Many of the religious clergies came out emphatically in support of the people who wanted to overthrow the leaders. This brought forth the important question about the acceptability of rebelling against unjust leaders in Islamic theological texts. The paper will look to analyse the Islamic legal and theological position on the permissibility of rebelling, whether there is scholarly consensus on the issue, and how the texts are analysed in order to come to the current position we have today. The position of the clergy who supported the Arab spring will also be analysed in order to deduce if their position falls within the religious framework. An inquiry will be about to determine the ideology of those who joined the rebellion after the inception and whether these ideas can be found in classical Islamic texts. The nuances of these positions will be analysed in order to determine whether what we witnessed was a rebellion or a revolution.

Keywords: rebellion, revolution, Arab spring, scholarly consensus

Procedia PDF Downloads 130
8802 Historical Evolution of Islamic Law and Its Application to the Islamic Finance

Authors: Malik Imtiaz Ahmad

Abstract:

The prime sources of Islamic Law or Shariah are Quran and Sunnah and is applied to the personal and public affairs of Muslims. Islamic law is deemed to be divine and furnishes a complete code of conduct based upon universal values to build honesty, trust, righteousness, piety, charity, and social justice. The primary focus of this paper was to examine the development of Islamic jurisprudence (Fiqh) over time and its relevance to the field of Islamic finance. This encompassed a comprehensive analysis of the historical context, key legal principles, and their application in contemporary financial systems adhering to Islamic principles. This study aimed to elucidate the deep-rooted connection between Islamic law and finance, offering valuable insights for practitioners and policymakers in the Islamic finance sector. Understanding the historical context and legal underpinnings is crucial for ensuring the compliance and ethicality of modern financial systems adhering to Islamic principles. Fintech solutions are developing fields to accelerate the digitalization of Islamic finance products and services for the harmonization of global investors' mandate. Through this study, we focus on institutional governance that will improve Sharia compliance, efficiency, transparency in decision-making, and Islamic finance's contribution to humanity through the SDGs program. The research paper employed an extensive literature review, historical analysis, examination of legal principles, and case studies to trace the evolution of Islamic law and its contemporary application in Islamic finance, providing a concise yet comprehensive understanding of this intricate relationship. Through these research methodologies, the aim was to provide a comprehensive and insightful exploration of the historical evolution of Islamic law and its relevance to contemporary Islamic finance, thereby contributing to a deeper understanding of this unique and growing sector of the global financial industry.

Keywords: sharia, sequencing Islamic jurisprudence, Islamic congruent marketing, social development goals of Islamic finance

Procedia PDF Downloads 40
8801 Artificial Law: Legal AI Systems and the Need to Satisfy Principles of Justice, Equality and the Protection of Human Rights

Authors: Begum Koru, Isik Aybay, Demet Celik Ulusoy

Abstract:

The discipline of law is quite complex and has its own terminology. Apart from written legal rules, there is also living law, which refers to legal practice. Basic legal rules aim at the happiness of individuals in social life and have different characteristics in different branches such as public or private law. On the other hand, law is a national phenomenon. The law of one nation and the legal system applied on the territory of another nation may be completely different. People who are experts in a particular field of law in one country may have insufficient expertise in the law of another country. Today, in addition to the local nature of law, international and even supranational law rules are applied in order to protect basic human values and ensure the protection of human rights around the world. Systems that offer algorithmic solutions to legal problems using artificial intelligence (AI) tools will perhaps serve to produce very meaningful results in terms of human rights. However, algorithms to be used should not be developed by only computer experts, but also need the contribution of people who are familiar with law, values, judicial decisions, and even the social and political culture of the society to which it will provide solutions. Otherwise, even if the algorithm works perfectly, it may not be compatible with the values of the society in which it is applied. The latest developments involving the use of AI techniques in legal systems indicate that artificial law will emerge as a new field in the discipline of law. More AI systems are already being applied in the field of law, with examples such as predicting judicial decisions, text summarization, decision support systems, and classification of documents. Algorithms for legal systems employing AI tools, especially in the field of prediction of judicial decisions and decision support systems, have the capacity to create automatic decisions instead of judges. When the judge is removed from this equation, artificial intelligence-made law created by an intelligent algorithm on its own emerges, whether the domain is national or international law. In this work, the aim is to make a general analysis of this new topic. Such an analysis needs both a literature survey and a perspective from computer experts' and lawyers' point of view. In some societies, the use of prediction or decision support systems may be useful to integrate international human rights safeguards. In this case, artificial law can serve to produce more comprehensive and human rights-protective results than written or living law. In non-democratic countries, it may even be thought that direct decisions and artificial intelligence-made law would be more protective instead of a decision "support" system. Since the values of law are directed towards "human happiness or well-being", it requires that the AI algorithms should always be capable of serving this purpose and based on the rule of law, the principle of justice and equality, and the protection of human rights.

Keywords: AI and law, artificial law, protection of human rights, AI tools for legal systems

Procedia PDF Downloads 46
8800 Resource Creation Using Natural Language Processing Techniques for Malay Translated Qur'an

Authors: Nor Diana Ahmad, Eric Atwell, Brandon Bennett

Abstract:

Text processing techniques for English have been developed for several decades. But for the Malay language, text processing methods are still far behind. Moreover, there are limited resources, tools for computational linguistic analysis available for the Malay language. Therefore, this research presents the use of natural language processing (NLP) in processing Malay translated Qur’an text. As the result, a new language resource for Malay translated Qur’an was created. This resource will help other researchers to build the necessary processing tools for the Malay language. This research also develops a simple question-answer prototype to demonstrate the use of the Malay Qur’an resource for text processing. This prototype has been developed using Python. The prototype pre-processes the Malay Qur’an and an input query using a stemming algorithm and then searches for occurrences of the query word stem. The result produced shows improved matching likelihood between user query and its answer. A POS-tagging algorithm has also been produced. The stemming and tagging algorithms can be used as tools for research related to other Malay texts and can be used to support applications such as information retrieval, question answering systems, ontology-based search and other text analysis tasks.

Keywords: language resource, Malay translated Qur'an, natural language processing (NLP), text processing

Procedia PDF Downloads 288
8799 Text Based Shuffling Algorithm on Graphics Processing Unit for Digital Watermarking

Authors: Zayar Phyo, Ei Chaw Htoon

Abstract:

In a New-LSB based Steganography method, the Fisher-Yates algorithm is used to permute an existing array randomly. However, that algorithm performance became slower and occurred memory overflow problem while processing the large dimension of images. Therefore, the Text-Based Shuffling algorithm aimed to select only necessary pixels as hiding characters at the specific position of an image according to the length of the input text. In this paper, the enhanced text-based shuffling algorithm is presented with the powered of GPU to improve more excellent performance. The proposed algorithm employs the OpenCL Aparapi framework, along with XORShift Kernel including the Pseudo-Random Number Generator (PRNG) Kernel. PRNG is applied to produce random numbers inside the kernel of OpenCL. The experiment of the proposed algorithm is carried out by practicing GPU that it can perform faster-processing speed and better efficiency without getting the disruption of unnecessary operating system tasks.

Keywords: LSB based steganography, Fisher-Yates algorithm, text-based shuffling algorithm, OpenCL, XORShiftKernel

Procedia PDF Downloads 122
8798 A Transformer-Based Question Answering Framework for Software Contract Risk Assessment

Authors: Qisheng Hu, Jianglei Han, Yue Yang, My Hoa Ha

Abstract:

When a company is considering purchasing software for commercial use, contract risk assessment is critical to identify risks to mitigate the potential adverse business impact, e.g., security, financial and regulatory risks. Contract risk assessment requires reviewers with specialized knowledge and time to evaluate the legal documents manually. Specifically, validating contracts for a software vendor requires the following steps: manual screening, interpreting legal documents, and extracting risk-prone segments. To automate the process, we proposed a framework to assist legal contract document risk identification, leveraging pre-trained deep learning models and natural language processing techniques. Given a set of pre-defined risk evaluation problems, our framework utilizes the pre-trained transformer-based models for question-answering to identify risk-prone sections in a contract. Furthermore, the question-answering model encodes the concatenated question-contract text and predicts the start and end position for clause extraction. Due to the limited labelled dataset for training, we leveraged transfer learning by fine-tuning the models with the CUAD dataset to enhance the model. On a dataset comprising 287 contract documents and 2000 labelled samples, our best model achieved an F1 score of 0.687.

Keywords: contract risk assessment, NLP, transfer learning, question answering

Procedia PDF Downloads 103
8797 Text Mining of Twitter Data Using a Latent Dirichlet Allocation Topic Model and Sentiment Analysis

Authors: Sidi Yang, Haiyi Zhang

Abstract:

Twitter is a microblogging platform, where millions of users daily share their attitudes, views, and opinions. Using a probabilistic Latent Dirichlet Allocation (LDA) topic model to discern the most popular topics in the Twitter data is an effective way to analyze a large set of tweets to find a set of topics in a computationally efficient manner. Sentiment analysis provides an effective method to show the emotions and sentiments found in each tweet and an efficient way to summarize the results in a manner that is clearly understood. The primary goal of this paper is to explore text mining, extract and analyze useful information from unstructured text using two approaches: LDA topic modelling and sentiment analysis by examining Twitter plain text data in English. These two methods allow people to dig data more effectively and efficiently. LDA topic model and sentiment analysis can also be applied to provide insight views in business and scientific fields.

Keywords: text mining, Twitter, topic model, sentiment analysis

Procedia PDF Downloads 154