2 resultados para Atrocity crimes

em Dalarna University College Electronic Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this essay is to examine and explain how the Swedish mining court of Stora Kopparberget (the Great Copper Mountain) implemented its judicial legislation between 1641-1682. Questions are asked about which counts of indictments the court tried, which sentences they handed out, in what quantities and how these results looks in comparison with other contemporary courts. The index cards of the court judicial protocols are the primary source of information. The methods are those of quantity- and comparative analysis.The results show that theft of copper ore was the most common crime ransacked by the court. Other common crimes were (in order): sin of omission, transgression of work directions, fights, slander and disdain, trade of stolen ore, failing appearance in court etc.Fines were by far the most common sentence followed by shorter imprisonments, gauntlets, loss of right to mine possession, twig beating, loss of work, penal servitude, banishment, “wooden horse riding” and finally military transcription. Even though previous re-search, in the field of Swedish specialized courts, is almost non existent evidence confirms great similarities between the Stora Kopparberget mining court and Sala mining court. This essay will, hopefully, enrich our knowledge of specialized courts, of 17th century mining industry and society and let us reach a broader understanding of the working conditions of the mountain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The ever increasing spurt in digital crimes such as image manipulation, image tampering, signature forgery, image forgery, illegal transaction, etc. have hard pressed the demand to combat these forms of criminal activities. In this direction, biometrics - the computer-based validation of a persons' identity is becoming more and more essential particularly for high security systems. The essence of biometrics is the measurement of person’s physiological or behavioral characteristics, it enables authentication of a person’s identity. Biometric-based authentication is also becoming increasingly important in computer-based applications because the amount of sensitive data stored in such systems is growing. The new demands of biometric systems are robustness, high recognition rates, capability to handle imprecision, uncertainties of non-statistical kind and magnanimous flexibility. It is exactly here that, the role of soft computing techniques comes to play. The main aim of this write-up is to present a pragmatic view on applications of soft computing techniques in biometrics and to analyze its impact. It is found that soft computing has already made inroads in terms of individual methods or in combination. Applications of varieties of neural networks top the list followed by fuzzy logic and evolutionary algorithms. In a nutshell, the soft computing paradigms are used for biometric tasks such as feature extraction, dimensionality reduction, pattern identification, pattern mapping and the like.