110 resources related to Criminal law
- Topics related to Criminal law
- IEEE Organizations related to Criminal law
- Conferences related to Criminal law
- Periodicals related to Criminal law
- Most published Xplore authors for Criminal law
2019 IEEE International Conference on Systems, Man, and Cybernetics (SMC2019) will be held in the south of Europe in Bari, one of the most beautiful and historical cities in Italy. The Bari region’s nickname is “Little California” for its nice weather and Bari's cuisine is one of Italian most traditional , based of local seafood and olive oil. SMC2019 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report up-to-the-minute innovations and developments, summarize stateof-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems and cybernetics. Advances have importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience, and thereby improve quality of life.
The theme of ISMA 18 is Cyber-physical systems. The scope of the conference includes the following topics in general: 1.Role of industry 4.0, IoT and Cloud computing in mechatronics, 2. System Integration, 3. Robotics and Intelligent systems, 4. Control systems, 5. Renewable energy and sustainable systems, 6. Education
CISTI is a technical and scientific event, whose purpose is to present and discuss knowledge,new perspectives, experiences and innovations in the Information Systems and Technologiesfield
Industrial Informatics, Computational Intelligence, Control and Systems, Cyber-physicalSystems, Energy and Environment, Mechatronics, Power Electronics, Signal and InformationProcessing, Network and Communication Technologies
4th International Conference (RAIT-201) has been conceived with multi-disciplinary areas inIT, Computers, Electronics together with application areas of Mineral, Service, Telecom sectorsthat are strategically important for the overall economic growth of our country.
IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
IEEE Computer Graphics and Applications (CG&A) bridges the theory and practice of computer graphics. From specific algorithms to full system implementations, CG&A offers a strong combination of peer-reviewed feature articles and refereed departments, including news and product announcements. Special Applications sidebars relate research stories to commercial development. Cover stories focus on creative applications of the technology by an artist or ...
The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...
Both general and technical articles on current technologies and methods used in biomedical and clinical engineering; societal implications of medical technologies; current news items; book reviews; patent descriptions; and correspondence. Special interest departments, students, law, clinical engineering, ethics, new products, society news, historical features and government.
2011 Fourth International Joint Conference on Computational Sciences and Optimization, 2011
Terrorism is a serious crime that with its systematic schemes brings devastating impact on all nations in the world and its development in a wider range with more destructiveness and international complexity than ever requires a shift from the previous single-objective mode of optimum determination to a mode with multiple objectives for optimum and satisfactory determination. It remains at present ...
Emerging face recognition technology can use forensic sketches to help identify criminal suspects.
2018 3rd International Conference on Computer Science and Engineering (UBMK), 2018
Given the steadily growing body of social media content, hate speech towards women is increasing. Such kind of contents have the potential to cause harm and suffering on an individual basis, and they may lead to social tension and disorder beyond cyber space. To support the automatic detection of cyber hate online, specifically on Twitter, we build a supervised learning ...
2017 12th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), 2017
In the criminal law of all countries, the crime of willful and malicious injury is a common accusation. The offender must bear the criminal responsibility and be punished by criminal penalty. However, because of the complexity of the circumstances for adjudication, the various kinds of statutory sentence, and the wide extent of the fixed-term imprisonment, the sentencing imbalance can be ...
2011 International Conference on Computer Science and Service System (CSSS), 2011
American is not only the birthplace of the computer and the internetwork, but also the most developed country in the world Internet at present. It is more perfect in computer crime legislation in American than the other countries. There are federal law and single law in federation, as well, law is issued in States. Protection of legal interests is extensive. ...
The Future of Semiconductor: Moore's Law Plus - IEEE Rebooting Computing Industry Summit 2017
From the Quantum Moore's Law toward Silicon Based Universal Quantum Computing - IEEE Rebooting Computing 2017
End of Moore's Law Challenges and Opportunities: Computer Architecture Perspectives: IEEE Rebooting Computing 2017, Margaret Martonosi
What Will Carry the Industry Beyond the Tradition of Moore's Law? - IEEE Rebooting Computing Industry Summit 2017
Did You Know: Eric Schmidt is HKN
Computing Beyond Moore's Law - William Vanderlinde: 2016 International Conference on Rebooting Computing
Panel Discussion: RegionaI Issues and Developments Related to Internet Governance, Cybersecurity and Privacy - ETAP Tel Aviv 2015
Q&A with Tom Conte: IEEE Rebooting Computing Podcast, Episode 1
Going Beyond Moore's Law: IEEE at SXSW 2017
Inspiring Brilliance: The Impact of Maxwell's Demon on Information Theory and Computing
Seven (Small) Steps to Protecting Big Trade Secrets and Confidential Information, Part 1 - IEEE USA
Q&A with Dejan Milojicic: IEEE Rebooting Computing Podcast, Episode 9
IEEE Medal of Honor Recipient (2008): Dr. Gordon Moore
Speaker Deepak Maheshwari - ETAP San Jose 2015
Interview with Marcel J.M. Pelgrom - The Pelgrom Law: IEEE Gustav Robert Kirchhoff Award Recipient
Yesterday, Today and the Next Decade ? James Whittaker, Microsoft
Q&A with Stan Williams: IEEE Rebooting Computing Podcast, Episode 6
A Conversation with... Wendell Wallach: IEEE TechEthics
Learn About Rebooting Computing
Terrorism is a serious crime that with its systematic schemes brings devastating impact on all nations in the world and its development in a wider range with more destructiveness and international complexity than ever requires a shift from the previous single-objective mode of optimum determination to a mode with multiple objectives for optimum and satisfactory determination. It remains at present still much room for an exploration of removal of terrorism in China.
Emerging face recognition technology can use forensic sketches to help identify criminal suspects.
Given the steadily growing body of social media content, hate speech towards women is increasing. Such kind of contents have the potential to cause harm and suffering on an individual basis, and they may lead to social tension and disorder beyond cyber space. To support the automatic detection of cyber hate online, specifically on Twitter, we build a supervised learning model which is developed to classify cyber hate towards woman on Twitter. Turkish tweets, with a hashtag specific to choice of clothing for women, have been collected and five machine learning based classification algorithms were applied including Support Vector Machines (using polynomial and RBF Kernel), J48, Naive Bayes, Random Forest and Random Tree. Preliminary results showed that hateful contents can be detected with high precision however more sophisticated approaches are necessary to improve recall.
In the criminal law of all countries, the crime of willful and malicious injury is a common accusation. The offender must bear the criminal responsibility and be punished by criminal penalty. However, because of the complexity of the circumstances for adjudication, the various kinds of statutory sentence, and the wide extent of the fixed-term imprisonment, the sentencing imbalance can be caused, such as different responsibility for same crime and different punishments for same responsibilities. In this paper, the penalty for the crime of willful and malicious injury is the main object of study, and some rules of sentencing reasoning are put forward to restrict the discretion of judges and to improve the impartiality and enforce-ability of punishment.
American is not only the birthplace of the computer and the internetwork, but also the most developed country in the world Internet at present. It is more perfect in computer crime legislation in American than the other countries. There are federal law and single law in federation, as well, law is issued in States. Protection of legal interests is extensive. Crime subjective aspects different. The behavior way and object are abundant. Punishment assignment is reasonable. Which are features of computer crime in America criminal law.
This paper considers the problem of decision making by a Judge in case of murder cases. The paper describes the construction of decision system to be used by a Judge about to pass sentence in a murder case. The system is an Analogy making from examples. In law, analogy is used to resolve issues on which there is no previous authority. Analogies are drawn from precedent cases. The Judge finds that the facts of another case are similar to the one at hand to an extent that the analogous application of the rule established in the previous case is justified. In this paper a neural network is described for judgment in murder cases. The examples demonstrate how to model legal system analogous to recent decisions, first by learning a system with court decisions, and second, by analyzing, modeling and testing the decision making neural network.
The transition to democracy in South Africa has brought with it certain challenges. The main challenge is to get rid of crime and corruption. The paper presents a technique to combat white-collar crime in telephone transactions by identifying and verifying speakers using artificial neural networks (ANNs). Results are presented to show that speaker identification is feasible and this is illustrated with two different types of ANN architectures and with two different types of characteristic features as inputs to ANNs.
SBVR's Structured English (SSE) approach has been applied to deal with problems in the United States legal domain. However, the method has scarcely been applied in Chinese legal field. In this article, we adapt the SBVR Structured English approach for the Chinese Criminal Law and express the Chinese legal rules using semi-formal and formal knowledge representation and automate the transformation from vocabularies and rules in SBVR to vocabularies and rules. Based on the representation above, we also give the preliminary reasoning process of the justifiable defense. The representation and the preliminary reasoning process lay a solid foundation for the reasoning mechanism of Chinese Criminal Law.
In china, there are many writings involving the research of judicial identification on real estate contract fraud, however, few of them have been in-depth exploration and many of them lack the systematic research. This paper, from the aspect of constitutive elements of crime, crime and innocence, this crime and that crime, identification of the amount of crime and so on, combined with the specific circumstances of contract fraud in judicial practice, has made a more systematic exposition according to the principle of Civil and Commercial Law and Criminal Law with a view to benefit the criminal justice and theories.
When we want to examine different kinds of forms of acts within the framework of the description of the Dutch criminal law, whether an act is permitted or not permitted, we can encounter a difference. On the one hand, it could be the case that a certain act is permitted by a competent normative authority. On the other hand, it could be the case that in the Dutch criminal law a certain act is weak permitted without a competent normative authority having enacted that permission. The article presents the formalisation of the weak and strong permission in deontic logic based on the logic of enactment. A permission that follows from the absence of a prohibition, we call a weak permission; this permission is not enacted. A strong permission is always enacted (implicitly or explicitly), and implies a giving choice. The distinction between these two types of permission is a consequence of the universality of a normative system by the closure rule: 'whatever is not forbidden, is permitted'.
No standards are currently tagged "Criminal law"