15 resultados para criminal code
em Cochin University of Science
Resumo:
This thesis is shows the result of the research work on the inherent Powers of the High Court in criminal jurisdiction. The criminal justice system in India recognizes inherent powers only of the High Court. The Theory and Philosophy of inherent powers are concerned the Distinction between civil and Criminal laws are of very little consequence. In formulating the research programme the confusion created by the concept of inherent powers and its application by High Court form the central point. How fully the concept is understood, how correctly the power is used, and how far it has enhanced the rationale of the administration of criminal justice, what is its importance and what are the solutions for the inherent power to earn a permanent status in the province of criminal jurisprudence are the themes of this study. The precipitation of new dimensions is the yardstick to acknowledge the inherent powers of the High Court and Supreme Court. It is of instant value in criminal justice system. This study concludes innovativeness provided by the inherent powers has helped the justice administration draw inspiration from the Constitution. A jurisprudence of inherent powers has developed with the weilding of inherent powers of the Supreme Court and the High Court. It is to unravel mystery of jurisprudence caused by the operation of the concept of inherent powers this research work gives emphasis. Its significance is all the more relevant when the power is exercised in the administration of criminal justice. Application or non application of inherent powers in a given case would tell upon the maturity and perfection of the standard of justice
Resumo:
Theoretically speaking, property is extension of the personality of the individual. It serves the purpose of satisfying the self of the individual in the society. Various theories have been attempted to explain its origin and development. However, it is the socialist theory of property which finds acceptance in many societies today. A proper definition of the concept of property has notbeen given in the statutes governing protection of property or in the Indian Constitution. While deciding cases under the Indian Penal Code, the courts have however, been interpreting the term 'property' in a manner facilitating its accommodation within the contours of the socialist theory of property, though there was no attempt for any formal theorization. An examination of the decisions under the Penal Code provisions and Constituent Assembly Debates has reinforced the above view that our courts as well as legislature have adopted the socialist concept of property. Because of the importance of the theory of property in the general scheme of this study, it was thought appropriate toinclude a chapter on the theory of property as reflected in our constitution.
Resumo:
This study is an attempt to look at the impact of international norms on the criminal justice administration in India. It has been confined to the criminal justice administration since it is here that the concept of sovereignty is affected the most. The study is intended to give a fair idea as to the position India holds in the matter of implementation of international norms in the area of criminal justice administration and the areas that require urgent attention. The study suggests that the country’s system is on the right track towards the implementation of the international norms. The position of law in India and the requirements under international norms with respect to criminal justice administration have been studied by considering the same at three stages – pre trial, trial and post trial stages. The question as to whether they comply with the international standards and the approaches of the court has been inquired into this study
Resumo:
Human rights are the basic rights of every individual against the state or any other public authority as a member of the human family irrespective of any other consideration. Thus every individual of the society has the inherent right to be treated with dignity in all situations including arrest and keeping in custody by the police. Rights of an individual in police custody are protected basically by the Indian Constitution and by various other laws like Code of Criminal Procedure, Evidence Act, Indian Penal Code and Protection of Human Rights Act. The term `custody' is defined neither in procedural nor in substantive laws. The word custody means protective care. The expression `police custody' as used in sec. 27 of Evidence Act does not necessarily mean formal arrest. In India with special reference to Kerala and evolution and development of the concept of human rights and various kinds of human rights violations in police custody in different stages of history. Human rights activists and various voluntary organisations reveals that there are so many factors contributing towards the causes of violations of human rights by police. Sociological causes like ambivalent outlook of the society with respect to the use of third degree methods by the police, economic causes like meager salary and inadequate living conditions, rampant corruption in police service, unnecessary political interference in the crime investigation, work load of police personnel without any time limit and periodic holidays, unnecessary pressure from superior police officers and the general public for speedy detection causing great mental strain to the investigating officers, defective system of recruitment and training, imperfect system of investigation and lack of public co-operation are some of the factors identified in the field survey towards the causes of violations of human rights in police custody.
Resumo:
Cryptosystem using linear codes was developed in 1978 by Mc-Eliece. Later in 1985 Niederreiter and others developed a modified version of cryptosystem using concepts of linear codes. But these systems were not used frequently because of its larger key size. In this study we were designing a cryptosystem using the concepts of algebraic geometric codes with smaller key size. Error detection and correction can be done efficiently by simple decoding methods using the cryptosystem developed. Approach: Algebraic geometric codes are codes, generated using curves. The cryptosystem use basic concepts of elliptic curves cryptography and generator matrix. Decrypted information takes the form of a repetition code. Due to this complexity of decoding procedure is reduced. Error detection and correction can be carried out efficiently by solving a simple system of linear equations, there by imposing the concepts of security along with error detection and correction. Results: Implementation of the algorithm is done on MATLAB and comparative analysis is also done on various parameters of the system. Attacks are common to all cryptosystems. But by securely choosing curve, field and representation of elements in field, we can overcome the attacks and a stable system can be generated. Conclusion: The algorithm defined here protects the information from an intruder and also from the error in communication channel by efficient error correction methods.
Resumo:
The present research problem is to study the existing encryption methods and to develop a new technique which is performance wise superior to other existing techniques and at the same time can be very well incorporated in the communication channels of Fault Tolerant Hard Real time systems along with existing Error Checking / Error Correcting codes, so that the intention of eaves dropping can be defeated. There are many encryption methods available now. Each method has got it's own merits and demerits. Similarly, many crypt analysis techniques which adversaries use are also available.
Resumo:
Embedded systems are usually designed for a single or a specified set of tasks. This specificity means the system design as well as its hardware/software development can be highly optimized. Embedded software must meet the requirements such as high reliability operation on resource-constrained platforms, real time constraints and rapid development. This necessitates the adoption of static machine codes analysis tools running on a host machine for the validation and optimization of embedded system codes, which can help meet all of these goals. This could significantly augment the software quality and is still a challenging field.Embedded systems are usually designed for a single or a specified set of tasks. This specificity means the system design as well as its hardware/software development can be highly optimized. Embedded software must meet the requirements such as high reliability operation on resource-constrained platforms, real time constraints and rapid development. This necessitates the adoption of static machine codes analysis tools running on a host machine for the validation and optimization of embedded system codes, which can help meet all of these goals. This could significantly augment the software quality and is still a challenging field.Embedded systems are usually designed for a single or a specified set of tasks. This specificity means the system design as well as its hardware/software development can be highly optimized. Embedded software must meet the requirements such as high reliability operation on resource-constrained platforms, real time constraints and rapid development. This necessitates the adoption of static machine codes analysis tools running on a host machine for the validation and optimization of embedded system codes, which can help meet all of these goals. This could significantly augment the software quality and is still a challenging field.Embedded systems are usually designed for a single or a specified set of tasks. This specificity means the system design as well as its hardware/software development can be highly optimized. Embedded software must meet the requirements such as high reliability operation on resource-constrained platforms, real time constraints and rapid development. This necessitates the adoption of static machine codes analysis tools running on a host machine for the validation and optimization of embedded system codes, which can help meet all of these goals. This could significantly augment the software quality and is still a challenging field.This dissertation contributes to an architecture oriented code validation, error localization and optimization technique assisting the embedded system designer in software debugging, to make it more effective at early detection of software bugs that are otherwise hard to detect, using the static analysis of machine codes. The focus of this work is to develop methods that automatically localize faults as well as optimize the code and thus improve the debugging process as well as quality of the code.Validation is done with the help of rules of inferences formulated for the target processor. The rules govern the occurrence of illegitimate/out of place instructions and code sequences for executing the computational and integrated peripheral functions. The stipulated rules are encoded in propositional logic formulae and their compliance is tested individually in all possible execution paths of the application programs. An incorrect sequence of machine code pattern is identified using slicing techniques on the control flow graph generated from the machine code.An algorithm to assist the compiler to eliminate the redundant bank switching codes and decide on optimum data allocation to banked memory resulting in minimum number of bank switching codes in embedded system software is proposed. A relation matrix and a state transition diagram formed for the active memory bank state transition corresponding to each bank selection instruction is used for the detection of redundant codes. Instances of code redundancy based on the stipulated rules for the target processor are identified.This validation and optimization tool can be integrated to the system development environment. It is a novel approach independent of compiler/assembler, applicable to a wide range of processors once appropriate rules are formulated. Program states are identified mainly with machine code pattern, which drastically reduces the state space creation contributing to an improved state-of-the-art model checking. Though the technique described is general, the implementation is architecture oriented, and hence the feasibility study is conducted on PIC16F87X microcontrollers. The proposed tool will be very useful in steering novices towards correct use of difficult microcontroller features in developing embedded systems.
Resumo:
The Union Territory of Pondicherry prior to its merger with the Indian Union was a French Colony. The erstwhile territory of Pondicherry along with its hamlets, namely, KARAIKKAL, MAHE and YANAM was administered by the French Regime. Before it was established by French in 1 6 74 A.D. it was part of Vijayanagara Empire. Prior to this, Pondicherry was a part of the Kingdom of Chola and Pallava Kings. During French Regime, the laws which were in force in France in relation to administration of civil and criminal justice were extended to the erstwhile Territory of Pondicherry. Thus while Pondicherry stood influenced by the Inquisitorial system since the beginning of the 18th century, the neighboring states forming part of the Indian Union since Independence came under the Influence of the British system, viz. accusatorial system. The territory of Pondicherry, for administrative reasons, came to be merged with the Indian Union in the early 60's. Following the merger, the Indian administration sought to extent its own laws from time to time replacing erstwhile French Laws, however, subject to certain savings. Thus the transitional period witnessed consequential changes in the administration of the territory, including the sphere of judicial system. Since I 963, the Union Territory of Pondicherry was brought under the spell of the Indian Legal System The people in Pondicherry ' thus have had the benefit of experiencing both the svstems. Their experiences will be of much help to those who undertake comparative studies in law. The plus and minus points of the respective systems help one to develop a detachment that helps independent evaluation of the svstents. The result of these studies could be relevant in revitalising our criminal systems.The present system is evaluated in the light of the past system. New dimensions are added by way' of an empirical study also.
Resumo:
This is a study in criminal law. The problem probed is the relationship between mental abnormality and criminal responsibility. The subject is yet an unsolved area in criminal jurisprudence. It is of great interest to many jurists lawyers philosophers and psychiatrists. The study lays special emphasis on the Indian law .Comparative assessment wherever found necessary,especially of positions in England ,United states and Germany is made. The thesis is in six parts and sixteen chapters.
Resumo:
Some study has been made earlier, but no attempt has ever been made to make the study comprehensive and comparative. There exists also no information as to the working of the system. Hence the work is undertaken to provide first hand knowledge of the legal institutions that had handled and now handles annually large masses of deprived and neglected population. An investigation is also necessary to know the legal and social characteristics of the jurisdiction enjoined on the court so that this will help compare the law in the statute with the law and practice. The evaluation of the working system in the changed social atmosphere is also an urgent need of the hour
Resumo:
The modern telecommunication industry demands higher capacity networks with high data rate. Orthogonal frequency division multiplexing (OFDM) is a promising technique for high data rate wireless communications at reasonable complexity in wireless channels. OFDM has been adopted for many types of wireless systems like wireless local area networks such as IEEE 802.11a, and digital audio/video broadcasting (DAB/DVB). The proposed research focuses on a concatenated coding scheme that improve the performance of OFDM based wireless communications. It uses a Redundant Residue Number System (RRNS) code as the outer code and a convolutional code as the inner code. The bit error rate (BER) performances of the proposed system under different channel conditions are investigated. These include the effect of additive white Gaussian noise (AWGN), multipath delay spread, peak power clipping and frame start synchronization error. The simulation results show that the proposed RRNS-Convolutional concatenated coding (RCCC) scheme provides significant improvement in the system performance by exploiting the inherent properties of RRNS.
Resumo:
Code clones are portions of source code which are similar to the original program code. The presence of code clones is considered as a bad feature of software as the maintenance of software becomes difficult due to the presence of code clones. Methods for code clone detection have gained immense significance in the last few years as they play a significant role in engineering applications such as analysis of program code, program understanding, plagiarism detection, error detection, code compaction and many more similar tasks. Despite of all these facts, several features of code clones if properly utilized can make software development process easier. In this work, we have pointed out such a feature of code clones which highlight the relevance of code clones in test sequence identification. Here program slicing is used in code clone detection. In addition, a classification of code clones is presented and the benefit of using program slicing in code clone detection is also mentioned in this work.
Resumo:
Optical Character Recognition plays an important role in Digital Image Processing and Pattern Recognition. Even though ambient study had been performed on foreign languages like Chinese and Japanese, effort on Indian script is still immature. OCR in Malayalam language is more complex as it is enriched with largest number of characters among all Indian languages. The challenge of recognition of characters is even high in handwritten domain, due to the varying writing style of each individual. In this paper we propose a system for recognition of offline handwritten Malayalam vowels. The proposed method uses Chain code and Image Centroid for the purpose of extracting features and a two layer feed forward network with scaled conjugate gradient for classification