867 resultados para sexual risk recognition
Resumo:
Navigational collisions are one of the major safety concerns for many seaports. Continuing growth of shipping traffic in number and sizes is likely to result in increased number of traffic movements, which consequently could result higher risk of collisions in these restricted waters. This continually increasing safety concern warrants a comprehensive technique for modeling collision risk in port waters, particularly for modeling the probability of collision events and the associated consequences (i.e., injuries and fatalities). A number of techniques have been utilized for modeling the risk qualitatively, semi-quantitatively and quantitatively. These traditional techniques mostly rely on historical collision data, often in conjunction with expert judgments. However, these techniques are hampered by several shortcomings, such as randomness and rarity of collision occurrence leading to obtaining insufficient number of collision counts for a sound statistical analysis, insufficiency in explaining collision causation, and reactive approach to safety. A promising alternative approach that overcomes these shortcomings is the navigational traffic conflict technique (NTCT), which uses traffic conflicts as an alternative to the collisions for modeling the probability of collision events quantitatively. This article explores the existing techniques for modeling collision risk in port waters. In particular, it identifies the advantages and limitations of the traditional techniques and highlights the potentials of the NTCT in overcoming the limitations. In view of the principles of the NTCT, a structured method for managing collision risk is proposed. This risk management method allows safety analysts to diagnose safety deficiencies in a proactive manner, which consequently has great potential for managing collision risk in a fast, reliable and efficient manner.
Resumo:
In this paper we use a sequence-based visual localization algorithm to reveal surprising answers to the question, how much visual information is actually needed to conduct effective navigation? The algorithm actively searches for the best local image matches within a sliding window of short route segments or 'sub-routes', and matches sub-routes by searching for coherent sequences of local image matches. In contract to many existing techniques, the technique requires no pre-training or camera parameter calibration. We compare the algorithm's performance to the state-of-the-art FAB-MAP 2.0 algorithm on a 70 km benchmark dataset. Performance matches or exceeds the state of the art feature-based localization technique using images as small as 4 pixels, fields of view reduced by a factor of 250, and pixel bit depths reduced to 2 bits. We present further results demonstrating the system localizing in an office environment with near 100% precision using two 7 bit Lego light sensors, as well as using 16 and 32 pixel images from a motorbike race and a mountain rally car stage. By demonstrating how little image information is required to achieve localization along a route, we hope to stimulate future 'low fidelity' approaches to visual navigation that complement probabilistic feature-based techniques.
Resumo:
Monitoring the natural environment is increasingly important as habit degradation and climate change reduce theworld’s biodiversity.We have developed software tools and applications to assist ecologists with the collection and analysis of acoustic data at large spatial and temporal scales.One of our key objectives is automated animal call recognition, and our approach has three novel attributes. First, we work with raw environmental audio, contaminated by noise and artefacts and containing calls that vary greatly in volume depending on the animal’s proximity to the microphone. Second, initial experimentation suggested that no single recognizer could dealwith the enormous variety of calls. Therefore, we developed a toolbox of generic recognizers to extract invariant features for each call type. Third, many species are cryptic and offer little data with which to train a recognizer. Many popular machine learning methods require large volumes of training and validation data and considerable time and expertise to prepare. Consequently we adopt bootstrap techniques that can be initiated with little data and refined subsequently. In this paper, we describe our recognition tools and present results for real ecological problems.
Resumo:
The finite element (FE) analysis is an effective method to study the strength and predict the fracture risk of endodontically-treated teeth. This paper presents a rapid method developed to generate a comprehensive tooth FE model using data retrieved from micro-computed tomography (μCT). With this method, the inhomogeneity of material properties of teeth was included into the model without dividing the tooth model into different regions. The material properties of the tooth were assumed to be related to the mineral density. The fracture risk at different tooth portions was assessed for root canal treatments. The micro-CT images of a tooth were processed by a Matlab software programme and the CT numbers were retrieved. The tooth contours were obtained with thresholding segmentation using Amira. The inner and outer surfaces of the tooth were imported into Solidworks and a three-dimensional (3D) tooth model was constructed. An assembly of the tooth model with the periodontal ligament (PDL) layer and surrounding bone was imported into ABAQUS. The material properties of the tooth were calculated from the retrieved CT numbers via ABAQUS user's subroutines. Three root canal geometries (original and two enlargements) were investigated. The proposed method in this study can generate detailed 3D finite element models of a tooth with different root canal enlargements and filling materials, and would be very useful for the assessment of the fracture risk at different tooth portions after root canal treatments.
Resumo:
I have been invited to discuss Risk and Responsibility in Women’s Prisons, a task which, is slightly intimidating for one such as I, who, having never worked in a prison, have never experienced the risks and responsibilities working in a prison entails. However, this discussion is based on what prisons’ staff have told me, as they have ruminated on the complexities of their jobs in women’s prisons and many of the examples which I will be using are taken from cross-national research which I did in 2000 and 2001 and which set out to analyse the fortunes of some innovatory programmes in relation to women’s prisons in England, Scotland, North America, Australia and Israel (Carlen 2002). The discussion draws in particular on the imaginative way in which the Scottish women’s prison, Cornton Vale, responded to the spate of suicides which it had in the late 1990s and which resulted in far reaching organizational change.
Resumo:
This article presents findings from a longitudinal study. The research aimed to explore the effectiveness of a treatment program for offenders which lasted for three years. The research design was structured around the program with interviews and psychometric testing undertaken at key points in time with the same group of respondents. View all notes that sought to evaluate a treatment program for child sexual abusers. A triangulated methodological approach was adopted drawing upon quantitative and qualitative methodological techniques. The focus here is upon one element of this research. 2 2The quantitative element of this research will be published shortly but is referred to in the following reports Davidson 2000, 2003 [research funded by the National Probation Service]. Psychometric testing was undertaken over a four-year period with the men attending the treatment program to explore shifts in the extent of denial, blame attribution, and victim empathy over time. Offender cognitive distortions, general health, and self-esteem were also explored via psychometric testing. An interview-administered survey was undertaken with all sex offenders registered with the Probation Service (those on probation and in custody) in order to gather demographic data, and 117 of 150 offenders responded. View all notes Ninety-one in-depth interviews were conducted over a four-year period with a small, nonrandom sample of twenty-one male offenders who had been convicted of sexual offenses against children. All of the men were subject to probation orders with a psychiatric condition (Criminal Justice Act, 1991). One of the aims of this element of the research was to explore the extent to which evidence of denial could be found in offenders’ accounts of offense circumstance and also to explore the extent to which offenders minimized the nature and extent of abuse perpetrated. Offenders’ accounts of offense circumstances were compared to victim statements, and stark differences emerge. These findings have considerable implications for treatment practice with sex offenders, where victims’ perceptions could be used to directly confront offender denial and minimization.
Resumo:
This paper is a selected review of research on issues surrounding the investigation of intra-familial child sexual abuse for children aged eight and above, in the criminal justice system. Particular attention is paid to features of the investigative interview in relation to the child's level of understanding, ability to report and likely emotional response when the proceedings take place. Best practice by police and social care agencies involves establishing valid and reliable information from children while attending to their developmental level and emotional state. The review aims to distil principles optimising this process from both the investigative judicial perspective and the child's focus, as well as from the inter-agency perspective and information sharing. Recommendations are made for improving the interview process based on research and methods from a range of disciplines and to optimise information recording in a format easily shared between agencies. Updated and ongoing training procedures are key to successful practice with training shared across police and social work agencies. The focus of this review is informed by preliminary findings from pilot research in progress on behalf of the Metropolitan Police Child Abuse Investigation Command.
Resumo:
This paper explores the danger that young people may be exposed to when using the Internet. The first part sets out the context by considering new developments in UK and international legislation and then explores educational moves to protect children. Focus is upon findings from research undertaken on behalf of the London Metropolitan Police Service in evaluating the Safer Surfing programme designed to enable young people’s safe Internet use. In the final part of this paper it is argued that more must however be done internationally both to protect children online and to curb the growing trade in indecent child images.
Resumo:
This paper presents a number of characteristics of the Internet that makes it attractive to online groomers. Relevant Internet characteristics include disconnected personal communication, mediating technology, universality, network externalities, distribution channel, time moderator, low‐cost standard, electronic double, electronic double manipulation, information asymmetry, infinite virtual capacity, independence in time and space, cyberspace, and dynamic social network. Potential sex offenders join virtual communities, where they meet other persons who have the same interest. A virtual community provides an online meeting place where people with similar interests can communicate and find useful information. Communication between members may be via email, bulletin boards, online chat, web‐based conferencing or other computer‐based media.
Resumo:
Many contend that the logical solution to woman abuse in marriage/cohabitation is for women to exit through legal separation, divorce, or other means. However, a growing body of empirical work shows that separation or divorce does not necessarily solve the problem of woman abuse. For example, in addition to experiencing lethal or nonlethal forms of physical violence and psychological abuse, many women who try to leave, or who have left their male partners, are sexually assaulted. The main objective of this paper is to critically review the extant empirical and theoretical work on separation/divorcesexual assault. Suggestions for future research and theorizing are also provided.