scholarly journals Issues of Historical Legal Source Studies

2021 ◽  
Vol 4 ◽  
pp. 55-59
Author(s):  
Svetlana V. Lonskaya ◽  

The methodology of historical and legal source study as an independent direction in science is still at the stage of formation. The article substantiates the methodology of the “source-centered” approach in the humanities, an attempt is made to delimit the basic concepts of historical and legal source study, the place of carriers of historical and legal information in the general classification of sources is determined. The sides of source study problems in historical and legal research are considered.

2017 ◽  
Author(s):  
Susan Nevelow Mart

Humans and machines are both involved in the creation of legal research resources. For legal information retrieval systems, the human-curated finding aid is being overtaken by the computer algorithm. But human-curated finding aids still exist. One of them is the West Key Number system. The Key Number system’s headnote classification of case law, started back in the nineteenth century, was and is the creation of humans. The retrospective headnote classification of the cases in Lexis’s case databases, started in 1999, was created primarily - although notexclusively - with computer algorithms. So how do these two very different systems deal with a similar headnote from the same case, when they link the headnote to the digest and citator functions in their respective databases? This paper continues the author’s investigation into this question, looking at the relevance of results from digest and citator searches run on matchingheadnotes in Westlaw and Lexis for ninety important federal and state cases, to see how each system performs. For digests, where the results are curated where a human has made a judgmentabout the meaning of a case and placed it in a classification system humans still have an advantage. For citators, where algorithm is battling algorithm to find relevant results, it is a matter of the better algorithm winning. But neither algorithm is doing a very good job of finding all the relevant results; the overlap between the two citator systems is not that large. The lesson for researchers: know how your legal research system was created, what involvement, if any, humans had in the curation of the system, and what a researcher can and cannot expect from thesystem being used.


2020 ◽  
Vol 3 (1) ◽  
pp. 41-52
Author(s):  
Andrew Shandy Utama

This research aims to explain the direction of policy regarding supervision of Islamic banking in the banking system in Indonesia. The method used in this research is normative legal research using the statutory approach. The results of this research explain that the policy regarding supervision of Islamic banking in the national banking system in Indonesia is headed toward an independent direction. In Law Number 7 of 1992 and Law Number 10 of 1998, it is stated that supervision of Islamic banking is done by Bank Indonesia as the central bank. Based on Law Number 21 of 2008, supervision of Islamic banking is strengthened by not only being supervised by Bank Indonesia, but also by the National Sharia Council of the Majelis Ulama Indonesia by placing Sharia Supervisory Councils in each Islamic bank. After the ratification of Law Number 21 of 2011, supervision of Islamic banking moved from Bank Indonesia to an independent institution called the Financial Services Authority.


2020 ◽  
Vol 1 (3) ◽  
pp. 14-23
Author(s):  
Tulkin Chulliev ◽  

The article explains the fundamental nature of migration by combining the definitions given by other scholars. The issue of labor migration is analyzed. One of the most important problems in contemporary migration processes - the problem of classification- is researched and a general classification is provided


Electronics ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 371
Author(s):  
Yerin Lee ◽  
Soyoung Lim ◽  
Il-Youp Kwak

Acoustic scene classification (ASC) categorizes an audio file based on the environment in which it has been recorded. This has long been studied in the detection and classification of acoustic scenes and events (DCASE). This presents the solution to Task 1 of the DCASE 2020 challenge submitted by the Chung-Ang University team. Task 1 addressed two challenges that ASC faces in real-world applications. One is that the audio recorded using different recording devices should be classified in general, and the other is that the model used should have low-complexity. We proposed two models to overcome the aforementioned problems. First, a more general classification model was proposed by combining the harmonic-percussive source separation (HPSS) and deltas-deltadeltas features with four different models. Second, using the same feature, depthwise separable convolution was applied to the Convolutional layer to develop a low-complexity model. Moreover, using gradient-weight class activation mapping (Grad-CAM), we investigated what part of the feature our model sees and identifies. Our proposed system ranked 9th and 7th in the competition for these two subtasks, respectively.


Istoriya ◽  
2021 ◽  
Vol 12 (6 (104)) ◽  
pp. 0
Author(s):  
Ekaterina Kirillova

Source study is the foundation of the research work of professional historians. It became the subject of the All-Russian Scientific Conference “Source Studies in Contemporary Medieval Studies”, which was held from 28 to 29 June 2021 at the Institute of World History at the Russian Academy of Sciences. The conference, conceived as a platform for regular communication of specialists in the history of the Middle Ages, allowed the participants and numerous listeners to get acquainted with the latest research on the source study of the history of Russia, Europe, the East and America. It included reports summarizing the experience of research and outlining the prospects for further work on key problems of source study of the history of the Middle Ages.


1899 ◽  
Vol 6 (8) ◽  
pp. 341-354 ◽  
Author(s):  
J. W. Gregory

The classification of the Palæozoic starfishes has long been in chaos. The earlier palæontologists, who founded most of the known genera, made no attempt at a general classification or to indicate the relations between the Palæozoic and existing representatives of the Asteroidea. The first step towards progress was Bronn's division of the extinct genera into three groups—the Ophiurasteriæ (which may be left out of account as Ophiuroidea), the Encrinasteriæ, and the Asterias veræ.


Libri ◽  
2018 ◽  
Vol 68 (4) ◽  
pp. 345-359
Author(s):  
Vicki Lawal ◽  
Peter G Underwood ◽  
Christine Stilwell

Abstract This article examines the effect of the adoption of social media in legal practice in Nigeria. It discusses some of the major challenges that have recently been experienced in the use of legal information in Nigeria within the context of the social media revolution, particularly with respect to ethics. A survey method was employed and data was collected through self-administered questionnaires to the study population comprising practicing lawyers located in various law firms in Nigeria. Outcomes from the study provide preliminary evidence on the nature of the application of social media in legal practice and the prospects for its inclusion as an important aspect of legal research in the legal education system in Nigeria.


2019 ◽  
Vol 4 (9) ◽  
pp. 34-44
Author(s):  
А. Тебекин ◽  
A. Tebekin

The author's classification of management decision-making methods, including twenty-five classes of methods, is presented for the first time. As part of the general classification of management decision-making methods, the role and place of a group of methods for making managerial decisions based on the optimization of performance indicators was demonstrated. In the group of methods for making managerial decisions based on the optimization of performance indicators, a subgroup of programming methods (linear, nonlinear and dynamic) is considered in detail. The features of use and application are shown when making managerial decisions of a subgroup of programming methods.


Author(s):  
А. E. Tyulin ◽  
◽  
V. V. Betanov ◽  

The article focuses on the issues of creating promising space technologies, their general characteristics, and special features. The basic principles for creating and implementing key navigation-ballistic technologies, which help ensure efficient control of spacecraft, are substantiated. A classification of the technologies is proposed based on the characteristics most often used in the area under consideration. Two bar charts of a typical technological cycle of navigation-ballistic support with the possibility of processing a joint sample of measurements of current navigation parameters and recurrent Kalman processing algorithms are analyzed. A variant of a general classification of technologies that allows singling out and correlating different types and classes of technologies is given. This contributes (especially at the early stages) to the improvement of the efficiency of their development.


Author(s):  
Elena Rossinskaya ◽  
Igor Ryadovskiy

The authors analyze problems connected with malware from the standpoint of the doctrine of the methods of computer crimes/offenses as one of the components of the theory of information-computer support of criminalistic work. Most methods of computer crimes are based on the unauthorized access to computer facilities and systems gained through malware that, in fact, acts as a weapon of crime. The authors present a classification of malware based on different parameters: from the standpoint of criminal law and criminology; the standpoint of information technology; the standpoint of the doctrine of computer crimes/offenses. Various grounds for the classification of malware are examined. A general classification, widely used by the developers of antiviral software, includes virus-programs, worm-programs and trojan-programs. In the modern situation of massive digitization, it is not practical to regard masquerading as a legitimate file as a dominant feature of trojan software. On the contrary, criminals try hard to hide from the user the downloading, installation and activity of malware that cannot self-propagate. The key method of propagating trojan programs is sending mass emails with attachments masquerading as useful content. The classification of malware by the way and method of propagation - viruses, worms and trojan programs - is only currently used due to traditions and does not reflect the essence of the process. A different classification of malware into autonomous, semi-autonomous and non-autonomous programs is based on the possibility of their autonomous functioning. At present there is practically no malware whose functions include only one specific type of actions, most of it contains a combination of various types of actions implemented through module architecture, which offers criminals wide opportunities for manipulating information. The key mechanisms of malwares work are described and illustrated through examples. Special attention is paid to harmful encryption software working through stable cryptographic algorithms - ransomware, when criminals demand ransom for restoring data. There is no criminal liability for such theft. The authors outline the problems connected with the possibility of the appearance of new malware that would affect cloud resources.


Sign in / Sign up

Export Citation Format

Share Document