Results 51 to 60 of about 115,305 (335)
Combating foreign terrorist fighters (individuals who travel abroad to participate in acts of violence as part of an uprising or of a non-State armed group) is a relatively recent challenge to the global counterterrorism effort.
A. G. Volevodz
doaj +1 more source
This article is devoted to the problem of confrontation between researchers about the dress of Ukrainian prosecutors and whether prosecutors should have class ranks (special ranks, equated to military ranks and providing bonuses to salaries).
Kaluzhna Oksana
doaj +1 more source
Empirical Approaches to Criminal Procedure [PDF]
This chapter discusses empirical approaches to criminal procedure, focusing on three broad and recurring themes that reflect the complex nature of the criminal justice system as a social institution: legal culture, discretion, and policy. It first considers criminal justice in the context of its sociopolitical culture, taking into account the place of ...
Hodgson, Jacqueline, Mou, Yu
openaire +1 more source
LeCaRDv2: A Large-Scale Chinese Legal Case Retrieval Dataset [PDF]
As an important component of intelligent legal systems, legal case retrieval plays a critical role in ensuring judicial justice and fairness. However, the development of legal case retrieval technologies in the Chinese legal system is restricted by three problems in existing datasets: limited data size, narrow definitions of legal relevance, and naive ...
arxiv
Criminal Investigation Tracker with Suspect Prediction using Machine Learning [PDF]
An automated approach to identifying offenders in Sri Lanka would be better than the current system. Obtaining information from eyewitnesses is one of the less reliable approaches and procedures still in use today. Automated criminal identification has the ability to save lives, notwithstanding Sri Lankan culture's lack of awareness of the issue. Using
arxiv
THE EVOLUTION OF CRIMINAL PROCEDURE IN UKRAINE OVER 30 YEARS OF INDEPENDENCE
In this article, the author explores relevant issues of the formation and development of the Ukrainian criminal process over the 30 years of existence of the state of Ukraine since the proclamation of its independence.
Shybiko Vasyl
doaj +1 more source
Ransomware as a Service using Smart Contracts and IPFS [PDF]
Decentralized systems, such as distributed ledgers and the InterPlanetary File System (IPFS), are designed to offer more open and robust services. However, they also create opportunities for illegal activities. We demonstrate how these technologies can be used to launch a ransomware as a service campaign.
arxiv
Criminal Procedure in Scotland
55 %Concluded from January number. 56Following is a schedule of the proceedings prior to the trial, compiled by Messrs. Renton and Brown in their book on criminal procedure: Monday, June 7-Petition and warrant to arrest issued. Tuesday, June 8-I)eclaration (if desired by accused) and committal for further examination.
openaire +3 more sources
Objective The aim of this study was to apply sequence analysis (SA) to phenotype health care patterns of adult patients with musculoskeletal (MSK) conditions using primary care electronic health records and to investigate the association between these health care patterns and patients’ self‐reported outcomes after consultation.
Smitha Mathew+6 more
wiley +1 more source
Classification of Instagram fake users using supervised machine learning algorithms [PDF]
In the contemporary era, online social networks have become integral to social life, revolutionizing the way individuals manage their social connections. While enhancing accessibility and immediacy, these networks have concurrently given rise to challenges, notably the proliferation of fraudulent profiles and online impersonation.
arxiv