Criminal law

View this topic in
Criminal law, or penal law, is the body of law that relates to crime. It might be defined as the body of rules that defines conduct that is prohibited by the state because it is held to threaten, harm or otherwise endanger the safety and welfare of the public, and that sets out the punishment to be imposed on those who breach these laws. (Wikipedia.org)






Conferences related to Criminal law

Back to Top

2013 IEEE Systems and Information Engineering Design Symposium (SIEDS)

SIEDS is a student focused international forum for applied research, development, and design in Systems and Information Engineering. The symposium is the leading showcase for undergraduate and masters graduate design projects or design oriented graduate theses. Faculty, industry, and government project advisors are welcome coauthors.


2012 International Conference on Information and Automation (ICIA)

Information, automation, and related areas.

  • 2011 International Conference on Information and Automation (ICIA)

    Information and automation science and engineering

  • 2010 International Conference on Information and Automation (ICIA)

    The objective of ICIA 2010 is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of informtion, robotics, automation and sensors to disseminate their latest research results and exchange views on the future research directions.

  • 2009 International Conference on Information and Automation (ICIA)

    information acquisition, sensors and sensor networks, bio-sensors, computer vision, pattern recognition, signal processing, information theory, speech recognition, information technologies for automation, human-machines interactions/interfaces, and virtual reality; Bio-robotics, medical robotics, network robots, tele-robotics, service robotics, micro and nano systems, machine intelligence, intelligent systems, mechatronics, control theory, automation process, and industrial automation.

  • 2008 International Conference on Information and Automation (ICIA)

    All related areas of information acquisition, especially sensors, wireless sensor networks, RFID, information acquisition/processing, sensor based robotics and control, and bioinformatics.


2012 International Conference on Management and Service Science (MASS 2012)

Enterprise Management, Engineering Management, Service Science, Financial Management, Knowledge Management


2012 International Symposium on Information Technology in Medicine and Education (ITME 2012)

ITME 2012 is to further explore the theoretical and practical issues of IT in education and medicine, Internet and computer networks and Multimedia Technology.

  • 2011 International Symposium on Information Technology in Medicine and Education (ITME 2011)

    The scope of the conference includes, but not limited to Architecture of Educational Information Systems, Building and Sharing Digital Education Resources on the Internet, Collaborative Learning/Training, Digital Library, e-Learning Pedagogical Strategies, Web Based Systems for Education, Medical Image Processing & compression, e-Health and e-Hospital, Medical Knowledge Mining, IT and Medical Informatics, Other related theories technologies and applications.

  • 2009 IEEE International Symposium on IT in Medicine & Education (ITME 2009)

    ITME 2009 is to further explore the theoretical and practical issues of IT in education and medicine, including Educational Information Systems, Digital Education Resources, Collaborative Learning/Training ,Computer Aided Teaching, e-Learning, Medical Image Processing & compression, Biomechanics, modeling and computing, Hospital Management Information, Construction of Medical Database and etc..


2011 3rd IEEE International Conference on Information Management and Engineering (ICIME)

ICIME is the main annual Information research conference aimed at presenting current research being carried out. Currently ICIME 2011 will be held during May 21 22, 2011. The idea of the conference is for the scientists, scholars, engineers and students from the Universities all around the world and the industry to present ongoing research activities, and hence to foster research relations between the Universities and the industry.

  • 2010 2nd IEEE International Conference on Information Management and Engineering (ICIME)

    ICIME is the main annual Information research conference in Kuala Lumpur aimed at presenting current research being carried out. Currently ICIME 2010 will be held during April 16 18, 2010. The idea of the conference is for the scientists, scholars, engineers and students from the Universities all around the world and the industry to present ongoing research activities, and hence to foster research relations between the Universities and the industry.


More Conferences

Periodicals related to Criminal law

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Intelligent Systems, IEEE

IEEE Intelligent Systems, a bimonthly publication of the IEEE Computer Society, provides peer-reviewed, cutting-edge articles on the theory and applications of systems that perceive, reason, learn, and act intelligently. The editorial staff collaborates with authors to produce technically accurate, timely, useful, and readable articles as part of a consistent and consistently valuable editorial product. The magazine serves software engineers, systems ...


Intelligent Transportation Systems, IEEE Transactions on

The theoretical, experimental and operational aspects of electrical and electronics engineering and information technologies as applied to Intelligent Transportation Systems (ITS). Intelligent Transportation Systems are defined as those systems utilizing synergistic technologies and systems engineering concepts to develop and improve transportation systems of all kinds. The scope of this interdisciplinary activity includes the promotion, consolidation and coordination of ITS technical ...


Security & Privacy, IEEE

IEEE Security & Privacy seeks to stimulate and track advances in security, privacy, and dependability and present these advances for a broad cross-section of academic researchers and industry practitioners. IEEE Security & Privacy aims to provide a unique combination of research articles, case studies, tutorials, and regular departments covering diverse aspects of security and dependability of computer-based systems, including legal ...


Systems, Man and Cybernetics, Part A, IEEE Transactions on

Systems engineering, including efforts that involve issue formnaulations, issue analysis and modeling, and decision making and issue interpretation at any of the life-cycle phases associated with the definition, development, and implementation of large systems. It will also include efforts that relate to systems management, systems engineering processes and a variety of systems engineering methods such as optimization, modeling and simulation. ...




Xplore Articles related to Criminal law

Back to Top

Matching Forensic Sketches and Mug Shots to Apprehend Criminals

Anil K. Jain; Brendan Klare Computer, 2011

Emerging face recognition technology can use forensic sketches to help identify criminal suspects.


Stealing Cars: Technology & Society from the Model T to the Gran Torino [Book Reviews]

David M. Burel IEEE Technology and Society Magazine, 2015

If you ever come across someone trying to sell a foolproof antitheft system or an unstealable car, you ought to call him a liar or at least direct him to read John Heitmann and Rebecca Morales's recent book on auto theft. The authors have assembled an effective and concise historical survey of automobile theft in the America. The book proceeds ...


Analogy making in criminal law with neural network

M. M. Janeela Theresa; V. Joseph Raj 2011 International Conference on Emerging Trends in Electrical and Computer Technology, 2011

This paper considers the problem of decision making by a Judge in case of murder cases. The paper describes the construction of decision system to be used by a Judge about to pass sentence in a murder case. The system is an Analogy making from examples. In law, analogy is used to resolve issues on which there is no previous ...


Counterfeit chips on the rise

Celia Gorman IEEE Spectrum, 2012

As more firms report finding phony chips, the danger they pose becomes clearer -- Making semiconductors is a big business-and, so it seems, is counterfeiting them. Just how big is becoming clearer than ever, thanks in part to the candor of the U.S. military, and it will become even clearer as new laws in the United States come into effect ...


Network Neutrality Principle as a Regulatory Tool: Implications for Crime Prevention and Criminal Law Enforcement

Gabriele Marra 2009 First International Conference on Evolving Internet, 2009

The aim of this contribution is to explore the possibility of using the well known concept of network neutrality (i.e., the property of a network infrastructure ignoring the content of the data packet it manages and being independent from legislative intervention) as a regulatory principle which goes beyond the contexts in which it is usually applied (namely, communication, antitrust and ...


More Xplore Articles

Educational Resources on Criminal law

Back to Top

eLearning

Matching Forensic Sketches and Mug Shots to Apprehend Criminals

Anil K. Jain; Brendan Klare Computer, 2011

Emerging face recognition technology can use forensic sketches to help identify criminal suspects.


Stealing Cars: Technology & Society from the Model T to the Gran Torino [Book Reviews]

David M. Burel IEEE Technology and Society Magazine, 2015

If you ever come across someone trying to sell a foolproof antitheft system or an unstealable car, you ought to call him a liar or at least direct him to read John Heitmann and Rebecca Morales's recent book on auto theft. The authors have assembled an effective and concise historical survey of automobile theft in the America. The book proceeds ...


Analogy making in criminal law with neural network

M. M. Janeela Theresa; V. Joseph Raj 2011 International Conference on Emerging Trends in Electrical and Computer Technology, 2011

This paper considers the problem of decision making by a Judge in case of murder cases. The paper describes the construction of decision system to be used by a Judge about to pass sentence in a murder case. The system is an Analogy making from examples. In law, analogy is used to resolve issues on which there is no previous ...


Counterfeit chips on the rise

Celia Gorman IEEE Spectrum, 2012

As more firms report finding phony chips, the danger they pose becomes clearer -- Making semiconductors is a big business-and, so it seems, is counterfeiting them. Just how big is becoming clearer than ever, thanks in part to the candor of the U.S. military, and it will become even clearer as new laws in the United States come into effect ...


Network Neutrality Principle as a Regulatory Tool: Implications for Crime Prevention and Criminal Law Enforcement

Gabriele Marra 2009 First International Conference on Evolving Internet, 2009

The aim of this contribution is to explore the possibility of using the well known concept of network neutrality (i.e., the property of a network infrastructure ignoring the content of the data packet it manages and being independent from legislative intervention) as a regulatory principle which goes beyond the contexts in which it is usually applied (namely, communication, antitrust and ...


More eLearning Resources

IEEE-USA E-Books

  • Minute Penalties for Killing Cyclists

    This chapter contains sections titled: Civil Penalties, Criminal Penalties, The Miller Case, The Swann Case, Why Was Gaylan Ray Lemmings Never Tried for the Death of Christie Lou Stefan?, Wichary Case, The Cyclist-Inferiority Phobia Affects Justice for Cyclists, Vulnerable User Laws, Conclusions



Standards related to Criminal law

Back to Top

No standards are currently tagged "Criminal law"


Jobs related to Criminal law

Back to Top