Search results for: police commands
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 382

Search results for: police commands

262 Forensic Nursing in the Emergency Department: The Overlooked Roles

Authors: E. Tugba Topcu

Abstract:

The emergency services are usually the first places to encounter forensic cases. Hence, it is important to consider forensics from the perspective of the emergency services staff and the physiological and psychological consequences that may arise as a result of behaviour by itself or another person. Accurate and detailed documentation of the situation in which the patient first arrives at the emergency service and preservation of the forensic findings is pivotal for the subsequent forensic investigation. The first step in determining whether or not a forensic case exists is to perform a medical examination of the patient. For each individual suspected to be part of a forensic case, police officers should be informed at the same time as the medical examination is being conducted. Violent events are increasing every year and with an increase in the number of forensic cases, emergency service workers have increasing responsibility and consequently play a key role in protecting, collecting and arranging the forensic evidence. In addition, because the emergency service workers involved in forensic events typically have information about the accused and/or victim, as well as evidence related to the events and the cause of injuries, police officers often require their testimony. However, both nurses and other health care personnel do not typically have adequate expertise in forensic medicine. Emergency nurses should take an active role for determining that whether any patient admitted to the emergency services is a clinical forensic patient the emergency service with injury and requiring possible punishment and knowing of their roles and responsibilities in this area provides legal protection as well as the protection of the judicial affair. Particularly, in emergency services, where rapid patient turnover and high workload exists, patient registration and case reporting may not exist. In such instances, the witnesses, typically the nurses, are often consulted for information. Knowledge of forensic medical matters plays a vital role in achieving justice. According to the Criminal Procedure Law, Article 75, Paragraph 3, ‘an internal body examination or the taking of blood or other biological samples from the body can be performed only by a doctor or other health professional member’. In favour of this item, the clinic nurse and doctor are mainly responsible for evaluating forensic cases in emergency departments, performing the examination, collecting evidence, and storing and reporting data. The courts place considerable importance on determining whether a suspect is the victim or accused and, thus, in terms of illuminating events, it is crucial that any evidence is gathered carefully and appropriately. All the evidence related to the forensic case including the forensic report should be handed over to the police officers. In instances where forensic evidence cannot be collected and the only way to obtain the evidence is the hospital environment, health care personnel in emergency services need to have knowledge about the diagnosis of forensic evidence, the collection of evidence, hiding evidence and provision of the evidence delivery chain.

Keywords: emergency department, emergency nursing, forensic cases, forensic nursing

Procedia PDF Downloads 216
261 An Assessment on the Impact of Community Policing in Crime Prevention and Control in Fagge Local Government Area, Kano State, Nigeria

Authors: Aliyu Shitu Said

Abstract:

One of the major setbacks of every society is the proliferation of crimes that results in the inducement of fear, destruction of properties and loss of lives of people. The rising incidence of crime and general insecurity rate in the society and the inability of the policing agencies to curtail the menace necessitated the introduction of community policing in order to have a collaborative effort with community members in addressing the problem of crime. Thus, this study assessed the impact of community policing in crime prevention and control in Fagge Local Government area, Kano State, Nigeria. The study also examined the elements, roles, and challenges of community policing in crime prevention and control in the study area. The study adopted Broken Window and Routine Activity theories as frame of analysis. Mixed methods of data collection (quantitative and qualitative) were utilized for the study. Multi stage and purposive sampling techniques were adopted in selection of the study population. A total of 308 respondents were sampled for the study. These include 300 members of the public who were sampled through a multi stage sampling for questionnaire administration and 8 other respondents who were purposively sampled for in-depth interview. Findings of the study revealed that community policing has significant impact on crime prevention and control in the study area. Findings of the study further revealed that the elements and roles of community policing are effective and fully utilized, and there is cordial relationship between the police and the community members in the study area. This study therefore recommends that government should provide adequate support to community policing programmes and give more awareness to public, so as to boost the morale of the community in having a collaborative effort with the police in crime prevention and control.

Keywords: community, policing, crime, prevention, control

Procedia PDF Downloads 38
260 Obstacle Detection and Path Tracking Application for Disables

Authors: Aliya Ashraf, Mehreen Sirshar, Fatima Akhtar, Farwa Kazmi, Jawaria Wazir

Abstract:

Vision, the basis for performing navigational tasks, is absent or greatly reduced in visually impaired people due to which they face many hurdles. For increasing the navigational capabilities of visually impaired people a desktop application ODAPTA is presented in this paper. The application uses camera to capture video from surroundings, apply various image processing algorithms to get information about path and obstacles, tracks them and delivers that information to user through voice commands. Experimental results show that the application works effectively for straight paths in daylight.

Keywords: visually impaired, ODAPTA, Region of Interest (ROI), driver fatigue, face detection, expression recognition, CCD camera, artificial intelligence

Procedia PDF Downloads 522
259 Effects of Food Habits on Road Accidents Due to Micro-Sleepiness and Analysis of Attitudes to Develop a Food Product as a Preventive Measure

Authors: Rumesh Liyanage, S. B. Nawaratne, K. K. D. S. Ranaweera, Indira Wickramasinghe, K. G. S. C. Katukurunda

Abstract:

Study it was attempted to identify an effect of food habits and publics’ attitudes on micro-sleepiness and preventive measures to develop a food product to combat. Statistical data pertaining to road accidents were collected from, Sri Lanka Police Traffic Division and a pre-tested questionnaire was used to collect data from 250 respondents. They were selected representing drivers (especially highway drivers), private and public sector workers (shift based) and cramming students (university and school). Questionnaires were directed to fill independently and personally and collected data were analyzed statistically. Results revealed that 76.84, 96.39 and 80.93% out of total respondents consumed rice for all three meals which lead to ingesting higher glycemic meals. Taking two hyper glycemic meals before 14.00h was identified as a cause of micro-sleepiness within these respondents. Peak level of road accidents were observed at 14.00 - 20.00h (38.2%)and intensity of micro-sleepiness falls at the same time period (37.36%) while 14.00 to 16.00h was the peak time, 16.00 to 18.00h was the least; again 18.00 to 20.00h it reappears slightly. Even though respondents of the survey expressed that peak hours of micro- sleepiness is 14.00-16.00h, according to police reports, peak hours fall in between 18.00-20.00h. Out of the interviewees, 69.27% strongly wanted to avoid micro-sleepiness and intend to spend LKR 10-20 on a commercial product to combat micro sleepiness. As age-old practices to suppress micro-sleepiness are time taken, modern day respondents (51.64%) like to have a quick solution through a drink. Therefore, food habits of morning and noon may cause for micro- sleepiness while dinner may cause for both, natural and micro-sleepiness due to the heavy glycemic load of food. According to the study micro-sleepiness, can be categorized into three zones such as low-risk zone (08.00-10.00h and 18.00-20.00h), manageable zone (10.00-12.00h), and high- risk zone (14.00-16.00h).

Keywords: food habits, glycemic load, micro-sleepiness, road accidents

Procedia PDF Downloads 516
258 Application of Adaptive Particle Filter for Localizing a Mobile Robot Using 3D Camera Data

Authors: Maysam Shahsavari, Seyed Jamalaldin Haddadi

Abstract:

There are several methods to localize a mobile robot such as relative, absolute and probabilistic. In this paper, particle filter due to its simple implementation and the fact that it does not need to know to the starting position will be used. This method estimates the position of the mobile robot using a probabilistic distribution, relying on a known map of the environment instead of predicting it. Afterwards, it updates this estimation by reading input sensors and control commands. To receive information from the surrounding world, distance to obstacles, for example, a Kinect is used which is much cheaper than a laser range finder. Finally, after explaining the Adaptive Particle Filter method and its implementation in detail, we will compare this method with the dead reckoning method and show that this method is much more suitable for situations in which we have a map of the environment.

Keywords: particle filter, localization, methods, odometry, kinect

Procedia PDF Downloads 237
257 Prevention of Ragging and Sexual Gender Based Violence (SGBV) in Higher Education Institutions in Sri Lanka

Authors: Anusha Edirisinghe

Abstract:

Sexual Gender based violence is a most common social phenomenon in higher education institutions. It has become a hidden crime of the Universities. Masculinities norms and attitudes are more influential and serve as key drivers and risk for ragging and SGBV. This research will reveal that in Sri Lankan universities, SGBV takes from the violence and murder of women students, assault and battery coerced sex, sexual harassment including harassment via information technology. This study focus is to prevention of ragging and SGBV in University system. Main objective of this paper describes and critically analyses of plight of ragging and SGBV in higher education institutions and legal and national level policy implementation to prevent these crimes in society. This paper is with special reference to ragging case from University of Kelaniya 2016. University Grant commission introduced an Act for the prevention of Ragging and gender standing committee established in Sri Lanka in 2016. And each university has been involved in the prevention of SGBV and ragging in higher education institutions. Case study from first year female student, reported sexual harassment was reported to the police station in May in 2016. After this case, the university has been implementing emergency action plan, short term and long term action plan. Ragging and SGBV task force was established and online complaint center opened to all students and academic and non- academics. Under these circumstances student complained to SGBV and other harassment to the university. University security system was strong support with police and marshals, and vigilant committees including lecturers. After this case all universities start to several programmes to stop violence in university

Keywords: higher Education, ragging, sexual gender-based violence, Sri Lanka

Procedia PDF Downloads 347
256 The Necessity and Methods of Abolishing Discrimination and Religious Violence

Authors: Hossein Boroujerdi, Mohammad R. Sadeghi, Maryam Moazen Zadeh

Abstract:

During the recent decades, the result of religious prophets has lost its attraction, and theology has become disfigured, so it has been made ugly. Undoubtedly, some of existing non-peaceful and harsh rules and measures within the religious books and contexts have been considered as the reasons and excuses for defamation of religions. Based on library sources and also extensive research in Quran and Islamic narratives, this study has aimed to find some alternative solutions and options to abolish and disregard those religious rules which are in contrary of human right charters and standards. The results have demonstrated that some of inhuman religious punishments such as execution, stoning, whipping as well as religious discriminations and warlike behaviors are in contrary of some other religious contexts and concepts. This finding have proved inadaptability between some religious contexts and religious records.

Keywords: adjustment and abolishment, discrimination, religious commands and laws, tolerance, violence

Procedia PDF Downloads 186
255 Provide Adequate Protection to Avoid Secondary Victimization: Ensuring the Rights of the Child Victims in the Criminal Justice System

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

The necessity of protection of the rights of victims of crime is a matter of concerns today. In the criminal justice system, child victims who are subjected to sexual abuse/violence are more vulnerable than the other crime victims. When they go to the police to lodge the complaint and until the end of the court proceedings, these victims are re-victimized in the criminal justice system. The rights of the suspects, accused and convicts are recognized and guaranteed by the constitution under fair trial norm, contemporary penal laws where crime is viewed as an offence against the State and existing criminal justice system in many jurisdictions including Sri Lanka. In this backdrop, a reasonable question arises as to whether the existing criminal justice system, especially which follow the adversarial mode of judicial trial protect the fair trial norm in the criminal justice process. Therefore, this paper intends to discuss the rights of the sexually abused child victims in the criminal justice system in order to restore imbalance between the rights of the wrongdoer and victim and suggest legal reforms to strengthen their rights in the criminal justice system which is essential to end secondary victimization. The paper considers Sri Lanka as a sample to discuss this issue. The paper looks at how the child victims are marginalized in the traditional adversarial model of the justice process, whether the contemporary penal laws adequately protect the right of these victims and whether the current laws set out the provisions to provide sufficient assistance and protection to them. The study further deals with the important principles adopted in international human rights law relating to the protection of the rights of the child victims in sexual offences cases. In this research paper, rights of the child victims in the investigation, trial and post-trial stages in the criminal justice process will be assessed. This research contains an extensive scrutiny of relevant international standards and local statutory provisions. Case law, books, journal articles, government publications such as commissions’ reports under this topic are rigorously reviewed as secondary resources. Further, randomly selected 25 child victims of sexual offences from the decided cases in last two years, police officers from 5 police divisions where the highest numbers of sexual offences were reported in last two years and the judicial officers both Magistrates and High Court Judges from the same judicial zones are interviewed. These data will be analyzed in order to find out the reasons for this specific sexual victimization, needs of these victims in various stages of the criminal justice system, relationship between victimization and offending and the difficulties and problems that these victims come across in criminal justice system. The author argues that the child victims are considerably neglected and their rights are not adequately protected in the adversarial model of the criminal justice process.

Keywords: child victims of sexual violence, criminal justice system, international standards, rights of child victims, Sri Lanka

Procedia PDF Downloads 341
254 Latest Generation Conducted Electrical Weapon Dart Design: Signature Marking and Removal for the Emergency Medicine Professional

Authors: J. D. Ho, D. M. Dawes, B. Driver

Abstract:

Introduction: TASER Conducted Electrical Weapons (CEWs) are the dominant CEWs in use and have been used in modern police and military operations since the late 1990s as a form of non-lethal weaponry. The 3rd generation of CEWs has been recently introduced and is known as The TASER 7. This new CEW will be replacing current CEW technology and has a new dart design that is important for emergency medical professionals to be familiar with because it requires a different method of removal and will leave a different marking pattern in human tissue than they may have been previously familiar with. features of this new dart design include: higher velocity impact, larger impact surface area, break away dart body segment, dual back-barb retention, newly designed removal process. As the TASER 7 begins to be deployed by the police and military personnel, these new features make it imperative that emergency medical professionals become familiar with the signature markings that this new dart design will make on human tissue and how to remove them. Methods: Multiple observational studies using high speed photography were used to record impact patterns of the new dart design on fresh tissue and also the newly recommended dart removal process. Both animal and human subjects were used to test this dart design prior to production release. Results: Data presented will include dart design overview, flight pattern accuracy, impact analysis, and dart removal example. Tissue photographs will be presented to demonstrate examples of signature TASER 7 dart markings that emergency medical professionals can expect to see. Conclusion: This work will provide the reader with an understanding of this newest generation CEW dart design, its key features, its signature marking pattern that can be expected and a recommendation of how to remove it from human tissue.

Keywords: TASER 7, conducted electrical weapon, dart mark, dart removal

Procedia PDF Downloads 128
253 Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology

Authors: Bala Adamu Malami

Abstract:

The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range.

Keywords: electronic, GPS, GSM modem, communication, vehicle

Procedia PDF Downloads 72
252 Investigation of Online Child Sexual Abuse: An Account of Covert Police Operations Across the Globe

Authors: Shivalaxmi Arumugham

Abstract:

Child sexual abuse (CSA) has taken several forms, particularly with the advent of internet technologies that provide pedophiles access to their targets anonymously at an affordable rate. To combat CSA which has far-reaching consequences on the physical and psychological health of the victims, a special act, the Protection of Children from Sexual Offences (POCSO) Act, was formulated amongst the existing laws. With its latest amendment criminalizing various online activities about child pornography also known as child sexual abuse materials in 2019, tremendous pressure is speculated on law enforcement to identify offenders online. Effective investigations of CSA cases help in not only to detect perpetrators but also in preventing the re-victimization of children. Understanding the vulnerability of the child population and that the offenders continue to develop stealthier strategies to operate, it is high time that traditional investigation, where the focus is on apprehending and prosecuting the offender, must make a paradigm shift to proactively investigate to prevent victimization at the first place. One of the proactive policing techniques involves understanding the psychology of the offenders and children and operating undercover to catch the criminals before a real child is victimized. With the fundamental descriptive approach to research, the article attempts to identify the multitude of issues associated with the investigation of child sexual abuse cases currently in practice in India. Then, the article contextualizes the various covert operations carried out by numerous law enforcement agencies across the globe. To provide this comprehensive overview, the paper examines various reports, websites, guidelines, protocols, judicial pronouncements, and research articles. Finally, the paper presents the challenges and ethical issues that are to be considered before getting into undercover operations either in the guise of a pedophile or as a child. The research hopes to contribute to the making of standard operating protocols for investigation officers and other relevant policymakers in this regard.

Keywords: child sexual abuse, cybercrime against children, covert police operations, investigation of CSA

Procedia PDF Downloads 71
251 Boundary Crossings: Brahmanical Patriarchy, Power, and Sexual Violence in COVID-19 in Odisha, India

Authors: Saraswati Suna

Abstract:

The outbreak of the COVID-19 epidemic and the subsequent lockdown have significantly impacted India's political, structural, and economic systems and a rising gap between the rich and the disadvantaged, upper and lower caste. For Dalit women, such forms of subjugation were followed by socioeconomic uncertainty due to the pandemic's economic shutdown and labour oppressions. Dalit women have been the victims of the most oppression among the nation's underprivileged groups. Dalit women undergo systemic oppression at the hands of the state, caste, class, gender, and religious hegemons historically. Dalit women hold a subordinate position within the gender to their male counterparts and caste to their upper-caste counterparts. This paper examines how Brahminical patriarchy and state power severely affected Dalit/Adivasi women during COVID-19 in Odisha, India. In order to understand caste-based sexual violence, a total of five cases have been analysed from newspapers. Findings revealed that Covid-19 appears to have a significant physical, psychological, and economic impact on Dalit women. The intention of sexual harassment and rape perpetrated by upper caste men is to maintain power and patriarchal culture in society. Dalit women are economically, socially, and culturally marginalised, which effectively exacerbates the sense of impunity by perpetrators of violence against Dalit women. This issue requires special attention to end atrocities against Dalit women. Dalit women become the target of rape, sexual assault, and murder. Sexual violence against Dalit women cannot be fully explained without linkage to caste, gender, and power. Dominant caste comes through caste privilege-socio-economic and politically; these factors contribute to sexual violence against Dalit women. The findings revealed that state police manipulate sexual violence, and in so doing, they create and deny access to both services to get justice. This article has argued that understanding Brahminical culture and the legal impacts of state police on Dalit women's identity requires a nuanced analysis.

Keywords: COVID-19, dalit women, sexual violence, brahminical patriarchy, power

Procedia PDF Downloads 148
250 Computational Fluid Dynamicsfd Simulations of Air Pollutant Dispersion: Validation of Fire Dynamic Simulator Against the Cute Experiments of the Cost ES1006 Action

Authors: Virginie Hergault, Siham Chebbah, Bertrand Frere

Abstract:

Following in-house objectives, Central laboratory of Paris police Prefecture conducted a general review on models and Computational Fluid Dynamics (CFD) codes used to simulate pollutant dispersion in the atmosphere. Starting from that review and considering main features of Large Eddy Simulation, Central Laboratory Of Paris Police Prefecture (LCPP) postulates that the Fire Dynamics Simulator (FDS) model, from National Institute of Standards and Technology (NIST), should be well suited for air pollutant dispersion modeling. This paper focuses on the implementation and the evaluation of FDS in the frame of the European COST ES1006 Action. This action aimed at quantifying the performance of modeling approaches. In this paper, the CUTE dataset carried out in the city of Hamburg, and its mock-up has been used. We have performed a comparison of FDS results with wind tunnel measurements from CUTE trials on the one hand, and, on the other, with the models results involved in the COST Action. The most time-consuming part of creating input data for simulations is the transfer of obstacle geometry information to the format required by SDS. Thus, we have developed Python codes to convert automatically building and topographic data to the FDS input file. In order to evaluate the predictions of FDS with observations, statistical performance measures have been used. These metrics include the fractional bias (FB), the normalized mean square error (NMSE) and the fraction of predictions within a factor of two of observations (FAC2). As well as the CFD models tested in the COST Action, FDS results demonstrate a good agreement with measured concentrations. Furthermore, the metrics assessment indicate that FB and NMSE meet the tolerance acceptable.

Keywords: numerical simulations, atmospheric dispersion, cost ES1006 action, CFD model, cute experiments, wind tunnel data, numerical results

Procedia PDF Downloads 106
249 Re-Victimization of Sex Trafficking Victims in Canada: Literature Review

Authors: Adrianna D. Hendricks

Abstract:

This paper examines the factors that contribute to the re-traumatization of victims of sex trafficking within the Canadian context. Sex trafficking occurring domestically in Canada is severely under-researched, stigmatized, and under-prosecuted, leading to the re-traumatization of victims by various levels of government. This is in part due to the Canadian criminal justice system unethically utilizing prostitution laws in cases of sex trafficking and partially due to the unaddressed stigmatization victims face within the justice system itself. Utilizing evidence from a current literature review, personal correspondence, and personal life experiences, this paper will demonstrate the need for victim involvement in policy reform. The current literature review was done through an academic database search using the terms: “Sex Trafficking, Exploitation, Canada”, with the limitation of articles written within the last five years and written within the Canadian context. Overall, from the results, only eight articles precisely matched the criteria. The current literature argues strongly and unanimously for more research and education of professionals who have close contact with high-risk populations (doctors, police officers, social workers, etc.) to protect both minors and adults from being sexually trafficked. Additionally, for women and girls who do not have Canadian citizenship, the fear of deportation becomes a barrier to disclosing exploitation experiences to professionals. There is a desperate need for more research done in tandem with survivors and victims to inform policymaking in a meaningful way. The researcher is a survivor of sex trafficking both as a youth and as an adult, giving the researcher a unique insight into the realities of the criminal justice system for victims of sex trafficking. Congruent to the current research, the author calls for standardized professional training for people in healthcare, police officers, court officials, and victim services, with the additional layer of victim involvement. Justice for victims/survivors can only be obtained if they have been consulted and believed. Without meaningful consultation with survivors, victims who are both minors and adults will continue to fall through the cracks in policy.

Keywords: Canadian policy, re-traumatization, sex-trafficking, stigmatization

Procedia PDF Downloads 32
248 Effectiveness of Qanun Number 14 of 2013 on Khalwat, Nasty in the Enforcement of Islamic Shari'a in Banda Aceh, Aceh Province

Authors: Muhadam Labolo, Mughny Ibtisyam Mukhlis, Zulkarnaen, Safira Maulida Rahman Soulisa

Abstract:

This research is motivated by one of the functions of government is a regulatory function. Aceh Province, especially in Banda Aceh City has special autonomy, one of them is in the application of Islamic law, but when the law implemented to the citizen, there are many problems happens. One of the problems faced by the Government and people of Banda Aceh was Seclusion. Seclusion/nasty silent act between two people mukallafor more of the opposite sex who is not mahram or without marriage. This study aims to determine and analyze how the effectiveness of the policy as well as enabling and inhibiting factors of Qanun Number 14 of 2003 On Khalwat (nasty) in sharia Islam Islamic law in the city of Banda Aceh. This type of research is qualitative research method is a descriptive and inductive approach. The source of data used is People, Problem, Phenomenon, and programs, while the data collection through field studies and literature such as interviews, observation, and documentation. The results of this study were analyzed by using data reduction, display data, conclusions, and verification. The results showed that the Qanun Number 14 of 2003 on Khalwat (nasty) in the establishment of Islamic law in Banda Aceh is still not effective. It is seen from the high number of violations seclusion committed by Banda Aceh citizen, especially among teenagers, lack of socialization, as well as a lack of budgetary support for the implementation of Islamic Law in Banda Aceh. The supporting factors are 1) Coordination and communication among agencies had been walking steadily. 2) Facilities and infrastructure Syar'iah Court of Banda Aceh and the Office of Sharia Islam Banda Aceh that very good. 3) The Cultural majority of the people of Banda Aceh that support. Inhibiting factors: 1) There are no written duties of each institution for the prosecution case Seclusion. 2) The lack of socialization programs. 3) Lack of facilities and infrastructure Municipal Police Unit and the WH less. 4) Lack of control by the family. 5) The absence of training for officials Municipal Police Units and the Wilayatul Hisbah Banda Aceh.

Keywords: effectiveness, Islamic Sharia, Khalwat, Qanun

Procedia PDF Downloads 201
247 Statistical Models and Time Series Forecasting on Crime Data in Nepal

Authors: Dila Ram Bhandari

Abstract:

Throughout the 20th century, new governments were created where identities such as ethnic, religious, linguistic, caste, communal, tribal, and others played a part in the development of constitutions and the legal system of victim and criminal justice. Acute issues with extremism, poverty, environmental degradation, cybercrimes, human rights violations, crime against, and victimization of both individuals and groups have recently plagued South Asian nations. Everyday massive number of crimes are steadfast, these frequent crimes have made the lives of common citizens restless. Crimes are one of the major threats to society and also for civilization. Crime is a bone of contention that can create a societal disturbance. The old-style crime solving practices are unable to live up to the requirement of existing crime situations. Crime analysis is one of the most important activities of the majority of intelligent and law enforcement organizations all over the world. The South Asia region lacks such a regional coordination mechanism, unlike central Asia of Asia Pacific regions, to facilitate criminal intelligence sharing and operational coordination related to organized crime, including illicit drug trafficking and money laundering. There have been numerous conversations in recent years about using data mining technology to combat crime and terrorism. The Data Detective program from Sentient as a software company, uses data mining techniques to support the police (Sentient, 2017). The goals of this internship are to test out several predictive model solutions and choose the most effective and promising one. First, extensive literature reviews on data mining, crime analysis, and crime data mining were conducted. Sentient offered a 7-year archive of crime statistics that were daily aggregated to produce a univariate dataset. Moreover, a daily incidence type aggregation was performed to produce a multivariate dataset. Each solution's forecast period lasted seven days. Statistical models and neural network models were the two main groups into which the experiments were split. For the crime data, neural networks fared better than statistical models. This study gives a general review of the applied statistics and neural network models. A detailed image of each model's performance on the available data and generalizability is provided by a comparative analysis of all the models on a comparable dataset. Obviously, the studies demonstrated that, in comparison to other models, Gated Recurrent Units (GRU) produced greater prediction. The crime records of 2005-2019 which was collected from Nepal Police headquarter and analysed by R programming. In conclusion, gated recurrent unit implementation could give benefit to police in predicting crime. Hence, time series analysis using GRU could be a prospective additional feature in Data Detective.

Keywords: time series analysis, forecasting, ARIMA, machine learning

Procedia PDF Downloads 131
246 Development of an Optimization Method for Myoelectric Signal Processing by Active Matrix Sensing in Robot Rehabilitation

Authors: Noriyoshi Yamauchi, Etsuo Horikawa, Takunori Tsuji

Abstract:

Training by exoskeleton robot is drawing attention as a rehabilitation method for body paralysis seen in many cases, and there are many forms that assist with the myoelectric signal generated by exercise commands from the brain. Rehabilitation requires more frequent training, but it is one of the reasons that the technology is required for the identification of the myoelectric potential derivation site and attachment of the device is preventing the spread of paralysis. In this research, we focus on improving the efficiency of gait training by exoskeleton type robots, improvement of myoelectric acquisition and analysis method using active matrix sensing method, and improvement of walking rehabilitation and walking by optimization of robot control.

Keywords: active matrix sensing, brain machine interface (BMI), the central pattern generator (CPG), myoelectric signal processing, robot rehabilitation

Procedia PDF Downloads 360
245 Psychological Functioning of Youth Experiencing Community and Collective Violence in Post-conflict Northern Ireland

Authors: Teresa Rushe, Nicole Devlin, Tara O Neill

Abstract:

In this study, we sought to examine associations between childhood experiences of community and collective violence and psychological functioning in young people who grew up in post-conflict Northern Ireland. We hypothesized that those who grew up with such experiences would demonstrate internalizing and externalizing difficulties in early adulthood and, furthermore, that these difficulties would be mediated by adverse childhood experiences occurring within the home environment. As part of the Northern Ireland Childhood Adversity Study, we recruited 213 young people aged 18-25 years (108 males) who grew up in the post-conflict society of Northern Ireland using purposive sampling. Participants completed a digital questionnaire to measure adverse childhood experiences as well as aspects of psychological functioning. We employed the Adverse Childhood Experience -International Questionnaire (ACE-IQ¬) adaptation of the original Adverse Childhood Experiences Questionnaire (ACE) as it additionally measured aspects of witnessing community violence (e.g., seeing someone being beaten/killed, fights) and experiences of collective violence (e.g., war, terrorism, police, or gangs’ battles exposure) during the first 18 years of life. 51% of our sample reported experiences of community and/or collective violence (N=108). Compared to young people with no such experiences (N=105), they also reported significantly more adverse experiences indicative of household dysfunction (e.g., family substance misuse, mental illness or domestic violence in the family, incarceration of a family member) but not more experiences of abuse or neglect. As expected, young people who grew up with the community and/or collective violence reported significantly higher anxiety and depression scores and were more likely to engage in acts of deliberate self-harm (internalizing symptoms). They also started drinking and taking drugs at a younger age and were significantly more likely to have been in trouble with the police (externalizing symptoms). When the type of violence exposure was separated by whether the violence was witnessed (community violence) or more directly experienced (collective violence), we found community and collective violence to have similar effects on externalizing symptoms, but for internalizing symptoms, we found evidence of a differential effect. Collective violence was associated with depressive symptoms, whereas witnessing community violence was associated with anxiety-type symptoms and deliberate self-harm. However, when experiences of household dysfunction were entered into the models predicting anxiety, depression, and deliberate self-harm, none of the main effects remained significant. This suggests internalizing type symptoms are mediated by immediate family-level experiences. By contrast, significant community and collective violence effects on externalizing behaviours: younger initiation of alcohol use, younger initiation of drug use, and getting into trouble with the police persisted after controlling for family-level factors and thus are directly associated with growing up with the community and collective violence. Given the cross-sectional nature of our study, we cannot comment on the direction of the effect. However, post-hoc correlational analyses revealed associations between externalising behaviours and personal factors, including greater risk-taking and young age at puberty. The implications of the findings will be discussed in relation to interventions for young people and families living with the community and collective violence.

Keywords: community and collective violence, adverse childhood experiences, youth, psychological wellbeing

Procedia PDF Downloads 48
244 Modeling the Present Economic and Social Alienation of Working Class in South Africa in the Musical Production ‘from Marikana to Mahagonny’ at Durban University of Technology (DUT)

Authors: Pamela Tancsik

Abstract:

The stage production in 2018, titled ‘From‘Marikana to Mahagonny’, began with a prologue in the form of the award-winning documentary ‘Miners Shot Down' by Rehad Desai, followed by Brecht/Weill’s song play or scenic cantata ‘Mahagonny’, premièred in Baden-Baden 1927. The central directorial concept of the DUT musical production ‘From Marikana to Mahagonny’ was to show a connection between the socio-political alienation of mineworkers in present-day South Africa and Brecht’s alienation effect in his scenic cantata ‘Mahagonny’. Marikana is a mining town about 50 km west of South Africa’s capital Pretoria. Mahagonny is a fantasy name for a utopian mining town in the United States. The characters, setting, and lyrics refer to America with of songs like ‘Benares’ and ‘Moon of Alabama’ and the use of typical American inventions such as dollars, saloons, and the telephone. The six singing characters in ‘Mahagonny’ all have typical American names: Charlie, Billy, Bobby, Jimmy, and the two girls they meet later are called Jessie and Bessie. The four men set off to seek Mahagonny. For them, it is the ultimate dream destination promising the fulfilment of all their desires, such as girls, alcohol, and dollars – in short, materialistic goals. Instead of finding a paradise, they experience how money and the practice of exploitive capitalism, and the lack of any moral and humanity is destroying their lives. In the end, Mahagonny gets demolished by a hurricane, an event which happened in 1926 in the United States. ‘God’ in person arrives disillusioned and bitter, complaining about violent and immoral mankind. In the end, he sends them all to hell. Charlie, Billy, Bobby, and Jimmy reply that this punishment does not mean anything to them because they have already been in hell for a long time – hell on earth is a reality, so the threat of hell after life is meaningless. Human life was also taken during the stand-off between striking mineworkers and the South African police on 16 August 2012. Miners from the Lonmin Platinum Mine went on an illegal strike, equipped with bush knives and spears. They were striking because their living conditions had never improved; they still lived in muddy shacks with no running water and electricity. Wages were as low as R4,000 (South African Rands), equivalent to just over 200 Euro per month. By August 2012, the negotiations between Lonmin management and the mineworkers’ unions, asking for a minimum wage of R12,500 per month, had failed. Police were sent in by the Government, and when the miners did not withdraw, the police shot at them. 34 were killed, some by bullets in their backs while running away and trying to hide behind rocks. In the musical play ‘From Marikana to Mahagonny’ audiences in South Africa are confronted with a documentary about Marikana, followed by Brecht/Weill’s scenic cantata, highlighting the tragic parallels between the Mahagonny story and characters from 1927 America and the Lonmin workers today in South Africa, showing that in 95 years, capitalism has not changed.

Keywords: alienation, brecht/Weill, mahagonny, marikana/South Africa, musical theatre

Procedia PDF Downloads 65
243 An Exploration of Anti-Terrorism Laws in Nigeria

Authors: Sani Mohammed Adam

Abstract:

This work seeks to review the security challenges facing Nigeria and explore the relevance of laws and policies in tackling the menace. The work looks at the adequacy of available legislations and the functionality of relevant institutions such as the Armed Forces, the Nigeria Police Force, the State Security Service, the Defence Intelligence Agency and the Nigerian Intelligence Agency etc. Comparisons would be made with other jurisdictions, such as inter alia, the Homeland Security in the USA and Counter Terrorism Laws of the United Kingdom. Recommendations would be made on how to strengthen both institutions and laws to curtail the growth of Terrorism in Nigeria.

Keywords: legislations, Nigeria, security, terrorism

Procedia PDF Downloads 638
242 Portable Hands-Free Process Assistant for Gas Turbine Maintenance

Authors: Elisabeth Brandenburg, Robert Woll, Rainer Stark

Abstract:

This paper presents how smart glasses and voice commands can be used for improving the maintenance process of industrial gas turbines. It presents the process of inspecting a gas turbine’s combustion chamber and how it is currently performed using a set of paper-based documents. In order to improve this process, a portable hands-free process assistance system has been conceived. In the following, it will be presented how the approach of user-centered design and the method of paper prototyping have been successfully applied in order to design a user interface and a corresponding workflow model that describes the possible interaction patterns between the user and the interface. The presented evaluation of these results suggests that the assistance system could help the user by rendering multiple manual activities obsolete, thus allowing him to work hands-free and to save time for generating protocols.

Keywords: paper prototyping, smart glasses, turbine maintenance, user centered design

Procedia PDF Downloads 287
241 Spiritual Quotient, a Significant Predictor of Teaching Effectiveness

Authors: Poonam Khurana, Mikelsh Prasad Yadav

Abstract:

All human beings are virtue by God as they get controlling mind and an attitude towards something with the help of which they can experience spirituality. People have different psychological thoughts and beliefs relating to god. Some people feel the immense pleasure in performing religious activities while some believe in the thought “Ahem Brahmasmi” i.e I am part of the divine and they feel pleasure in activities which motivate them to achieve peace. Religion in psychology is considered as a specific fundamental set of beliefs, thoughts and practices generally agreed and controlled by a number of person. It is the psychology of a person which commands their mind in deciding at which path they can attain the eternal feelings of the universe and accordingly they will develop their behavior towards religion and spirituality. Keeping the same in mind, the present study is based much on literature and a brief analysis of 50 teachers in Delhi and NCR colleges and makes an attempt to study the relationship of spiritual quotient and effective teaching and suggest spiritual quotient as a considerable predictor to make the workplace accessible.

Keywords: effectiveness, quotient, teaching, spiritual

Procedia PDF Downloads 390
240 A Critical Case Study of Women Police in Ranchi, Jharkhand, India: An Analysis of Work Life Balance of Women in Jharkhand, India

Authors: Swati Minz, Pradeep Munda, Ranchi Jharkhand

Abstract:

Women of today’s era are well educated and they are best and proficient at their skills that are key to success anywhere. Government played a major role in uplifting women in Indian society. Through all these efforts Indian women decided to move forward and started choosing career path which was itself a challenge in their life. The people in the society had a very hatred feeling for the women who chose a career and moved forward. Women in today’s times have achieved a lot but in reality they have to still travel a long way. Women started leaving the secured domains of their home and moved out, but a harsh, cruel, exploitative world awaits them, where women have to prove their talent against the world who see women as merely vassals of producing children. In spite all modernisation, a woman has her limits and emerges to claim traditional male space, juggling with many family problems and multiple roles to excel at a level that would have been perceived as impossible a generation ago. Still a woman in India is storming traditional male fields. Even the occupation which had male monopoly life defense services, merchant navy, administrative or police services, these are the best examples for women now. If these women are taken under consideration they never had any issues while fighting a battle ,or trying to encroach into the men’s world ,but rather, they adopts themselves in the situation and are good ,trying to justify their roles and proving themselves. The last few decades there have been noticed an enormous growth in levels of education, confidence and the most importantly, ambition noticed towards in women, who all are striving their rights and claiming a dignified place in the society. Previously women were educated for the sake to get married and start new family but nowadays they utilize their skill productively. Since the time after independence, considering both women in India in general and women in Jharkhand in particular has played a very prominent role in all walks of life including the professions. Any success and achievement in any organisation depends on their contribution as well. Due to these consequences, there has always been a need to study and focus light on issues affecting women professionals, empowerment and their work life balance.

Keywords: women, work life balance, work empowerment, career, struggle, society, challenges, family, society, achievement

Procedia PDF Downloads 366
239 Investigating Homicide Offender Typologies Based on Their Clinical Histories and Crime Scene Behaviour Patterns

Authors: Valeria Abreu Minero, Edward Barker, Hannah Dickson, Francois Husson, Sandra Flynn, Jennifer Shaw

Abstract:

Purpose – The purpose of this paper is to identify offender typologies based on aspects of the offenders’ psychopathology and their associations with crime scene behaviours using data derived from the National Confidential Enquiry into Suicide and Safety in Mental Health concerning homicides in England and Wales committed by offenders in contact with mental health services in the year preceding the offence (n=759). Design/methodology/approach – The authors used multiple correspondence analysis to investigate the interrelationships between the variables and hierarchical agglomerative clustering to identify offender typologies. Variables describing: the offender’s mental health history; the offenders’ mental state at the time of offence; characteristics useful for police investigations; and patterns of crime scene behaviours were included. Findings – Results showed differences in the offender’s histories in relation to their crime scene behaviours. Further, analyses revealed three homicide typologies: externalising, psychosis and depression. Analyses revealed three homicide typologies: externalising, psychotic and depressive. Practical implications – These typologies may assist the police during homicide investigations by: furthering their understanding of the crime or likely suspect; offering insights into crime patterns; provide advice as to what an offender’s offence behaviour might signify about his/her mental health background; findings suggest information concerning offender psychopathology may be useful for offender profiling purposes in cases of homicide offenders with schizophrenia, depression and comorbid diagnosis of personality disorder and alcohol/drug dependence. Originality/value – Empirical studies with an emphasis on offender profiling have almost exclusively focussed on the inference of offender demographic characteristics. This study provides a first step in the exploration of offender psychopathology and its integration to the multivariate analysis of offence information for the purposes of investigative profiling of homicide by identifying the dominant patterns of mental illness within homicidal behaviour.

Keywords: offender profiling, mental illness, psychopathology, multivariate analysis, homicide, crime scene analysis, crime scene behviours, investigative advice

Procedia PDF Downloads 95
238 The Anatomy and Characteristics of Online Romance Scams

Authors: Danuvasin Charoen

Abstract:

Online romance scams are conducted by criminals using social networks and dating sites. These criminals use love to deceive the victims to send them money. The victims not only lose money to the criminals, but they are also heartbroken. This study investigates how online romance scams work and why people become victims to them. The researcher also identifies the characteristics of the perpetrators and victims. The data were collected from in-depth interviews with former victims and police officers responsible for the cases. By studying the methods and characteristics of the online romance scam, we can develop effective methods and policies to reduce the rates of such crimes.

Keywords: romance scam, online scam, phishing, cybercrime

Procedia PDF Downloads 124
237 Interactive Shadow Play Animation System

Authors: Bo Wan, Xiu Wen, Lingling An, Xiaoling Ding

Abstract:

The paper describes a Chinese shadow play animation system based on Kinect. Users, without any professional training, can personally manipulate the shadow characters to finish a shadow play performance by their body actions and get a shadow play video through giving the record command to our system if they want. In our system, Kinect is responsible for capturing human movement and voice commands data. Gesture recognition module is used to control the change of the shadow play scenes. After packaging the data from Kinect and the recognition result from gesture recognition module, VRPN transmits them to the server-side. At last, the server-side uses the information to control the motion of shadow characters and video recording. This system not only achieves human-computer interaction, but also realizes the interaction between people. It brings an entertaining experience to users and easy to operate for all ages. Even more important is that the application background of Chinese shadow play embodies the protection of the art of shadow play animation.

Keywords: hadow play animation, Kinect, gesture recognition, VRPN, HCI

Procedia PDF Downloads 370
236 Improving Communication System through Router Configuration: The Nigerian Navy Experience

Authors: Saidu I. Rambo, Emmanuel O. Ibam, Sunday O. Adewale

Abstract:

The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used.

Keywords: C-band, communication, router, VSAT

Procedia PDF Downloads 340
235 Organized Crime-A Social Challenge for Kosovo towards European Union Integration

Authors: Samedin Mehmeti

Abstract:

Very tens political and economic situation, in particular armed conflicts that followed at the time of the destruction of the former Yugoslavia, influenced migrations and displacement of population. Especially setting international sanctions and embargo influenced the creation of organized criminal groups. A lot of members of the former Yugoslav security apparatus in collaboration with ordinary criminal groups engaged in: smuggling of goods, petroleum and arms, sale and transport of drugs, payable murder, damage to public property, kidnappings, extortion, racketeering, etc. This tradition of criminality, of course in other forms and with other methods, has continued after conflicts and continues with a high intensity even in nowadays. One of the most delicate problems of organized crime activity is the impact on the economic sphere, where organized crime opposes and severely damages national security and economy to criminalize it in certain sectors and directions. Organized crime groups including who find Kosovo as a place to develop their criminal activities are characterized by: loyalty of many people especially through family connections and kinship in carrying out criminal activities and the existence of powerful hierarchy of leadership which in many cases include the corrupt officials of state apparatus. Groups have clear hierarchy and flexible structure of command, each member within the criminal group knows his duties concrete. According to statistics presented in police reports its notable that Kosovo has a large number of cases of organized crime, cultivation, trafficking and possession of narcotics. As already is very well known that one of the primary conditions that must be fulfilled on track toward integration in the European Union is precisely to prevent and combat organized crime. Kosovo has serious problems with prosecutorial and judicial system. But the misuse of public funds, even those coming directly from EU budget or the budget of the European Union member states, have a negative impact on this process. The economic crisis that has gripped some of the EU countries has led to the creation of an environment in which there are far fewer resources and opportunities to invest in preventing and combating organized crime within member states. This automatically reduces the level of financial support for other countries in the fight against organized crime. Kosovo as a poor country, now has less likely benefiting from the support tools that will be eventually offered by Europe set of in this area.

Keywords: police, european integration, organized crime, narcotics

Procedia PDF Downloads 413
234 Unearthing Air Traffic Control Officers Decision Instructional Patterns From Simulator Data for Application in Human Machine Teams

Authors: Zainuddin Zakaria, Sun Woh Lye

Abstract:

Despite the continuous advancements in automated conflict resolution tools, there is still a low rate of adoption of automation from Air Traffic Control Officers (ATCOs). Trust or acceptance in these tools and conformance to the individual ATCO preferences in strategy execution for conflict resolution are two key factors that impact their use. This paper proposes a methodology to unearth and classify ATCO conflict resolution strategies from simulator data of trained and qualified ATCOs. The methodology involves the extraction of ATCO executive control actions and the establishment of a system of strategy resolution classification based on ATCO radar commands and prevailing flight parameters in deconflicting a pair of aircraft. Six main strategies used to handle various categories of conflict were identified and discussed. It was found that ATCOs were about twice more likely to choose only vertical maneuvers in conflict resolution compared to horizontal maneuvers or a combination of both vertical and horizontal maneuvers.

Keywords: air traffic control strategies, conflict resolution, simulator data, strategy classification system

Procedia PDF Downloads 115
233 Optimized Control of Roll Stability of Missile using Genetic Algorithm

Authors: Pham Van Hung, Nguyen Trong Hieu, Le Quoc Dinh, Nguyen Kiem Chien, Le Dinh Hieu

Abstract:

The article focuses on the study of automatic flight control on missiles during operation. The quality standards and characteristics of missile operations are very strict, requiring high stability and accurate response to commands within a relatively wide range of work. The study analyzes the linear transfer function model of the Missile Roll channel to facilitate the development of control systems. A two-loop control structure for the Missile Roll channel is proposed, with the inner loop controlling the Missile Roll rate and the outer loop controlling the Missile Roll angle. To determine the optimal control parameters, a genetic algorithm is applied. The study uses MATLAB simulation software to implement the genetic algorithm and evaluate the quality of the closed-loop system. The results show that the system achieves better quality than the original structure and is simple, reliable, and ready for implementation in practical experiments.

Keywords: genetic algorithm, roll chanel, two-loop control structure, missile

Procedia PDF Downloads 57