scholarly journals Web Application based Image Geolocation Analysis to Detect Human Trafficking

2021 ◽  
Vol 4 (2) ◽  
pp. 69-77
Author(s):  
Kim Kyounggon ◽  
Ibrahim Adam ◽  
Abdulrahman Al Qunaibit ◽  
Nayef Shabel ◽  
Faisal Al Fehaid

Migrant smuggling is a dangerous phenomenon threatening international peace and security. This global concern for many countries is mainly due to the high use of multimedia devices and social media. There are great demands to specify an in depth gathering of information about a suspect’s mobile device while investigating cases of human trafficking and migrant smuggling. The primary purpose of this study is to help resolve the human trafficking problem that currently faces Sudan. In this paper we cover the steps used to geolocate images captured from suspects and victims’ mobile devices cameras. The obtained images are then analyzed using our specialized developed web application. This latter is built using open-source tools such as the Laravel framework and a Google Maps API which is considered as the main component of the web application. The results of the developed web application on a real case in Sudan has proven its usefulness in easing and speeding up the digital investigation process.

Author(s):  
Matthew N.O. Sadiku ◽  
Adebowale E. Shadare ◽  
Sarhan M. Musa

Digital chain of custody is the record of preservation of digital evidence from collection to presentation in the court of law. This is an essential part of digital investigation process.  Its key objective is to ensure that the digital evidence presented to the court remains as originally collected, without tampering. The chain of custody is important for admissible evidence in court. Without a chain of custody, the opposing attorney can challenge or dismiss the evidence presented. The aim of this paper is to provide a brief introduction to the concept of digital chain custody.


2018 ◽  
Vol 48 (3) ◽  
pp. 84-90 ◽  
Author(s):  
E. A. Lapchenko ◽  
S. P. Isakova ◽  
T. N. Bobrova ◽  
L. A. Kolpakova

It is shown that the application of the Internet technologies is relevant in the selection of crop production technologies and the formation of a rational composition of the machine-and-tractor fl eet taking into account the conditions and production resources of a particular agricultural enterprise. The work gives a short description of the web applications, namely “ExactFarming”, “Agrivi” and “AgCommand” that provide a possibility to select technologies and technical means of soil treatment, and their functions. “ExactFarming” allows to collect and store information about temperature, precipitation and weather forecast in certain areas, keep records of information about crops and make technological maps using expert templates. “Agrivi” allows to store and provide access to weather information in the fi elds with certain crops. It has algorithms to detect and make warnings about risks related to diseases and pests, as well as provides economic calculations of crop profi tability and crop planning. “AgCommand” allows to track the position of machinery and equipment in the fi elds and provides data on the weather situation in order to plan the use of agricultural machinery in the fi elds. The web applications presented hereabove do not show relation between the technologies applied and agro-climatic features of the farm location zone. They do not take into account the phytosanitary conditions in the previous years, or the relief and contour of the fi elds while drawing up technological maps or selecting the machine-and-tractor fl eet. Siberian Physical-Technical Institute of Agrarian Problems of Siberian Federal Scientifi c Center of AgroBioTechnologies of the Russian Academy of Sciences developed a software complex PIKAT for supporting machine agrotechnologies for production of spring wheat grain at an agricultural enterprise, on the basis of which there is a plan to develop a web application that will consider all the main factors limiting the yield of cultivated crops.


2020 ◽  
Author(s):  
Darshak Mota ◽  
Neel Zadafiya ◽  
Jinan Fiaidhi

Java Spring is an application development framework for enterprise Java. It is an open source platform which is used to develop robust Java application easily. Spring can also be performed using MVC structure. The MVC architecture is based on Model View and Controller techniques, where the project structure or code is divided into three parts or sections which helps to categorize the code files and other files in an organized form. Model, View and Controller code are interrelated and often passes and fetches information from each other without having to put all code in a single file which can make testing the program easy. Testing the application while and after development is an integral part of the Software Development Life Cycle (SDLC). Different techniques have been used to test the web application which is developed using Java Spring MVC architecture. And compares the results among all the three different techniques used to test the web application.


Author(s):  
Ellen Jenny Ravndal

This chapter explores all aspects of Trygve Lie’s interaction with the Security Council, beginning with his appointment process and the negotiation of the relative domains of the Council and the Secretary-General. This was a time when the working methods of the UN system were rapidly evolving through political negotiation and responses to external crises. It examines Lie’s personality and character, how he viewed his own responsibilities in the maintenance of international peace and security as crises arose, the legal and political tools he developed and exercised, and his changing relationship with individual permanent members and the six elected members. In the emerging Cold War, Lie’s position in the Security Council would be determined in particular by his relationships with the United States and the Soviet Union. Taking initiative in response to external crises in Iran, Palestine, Berlin, and Korea, Lie succeeded in laying foundations for an expanded political role for the Secretary-General.


2021 ◽  
Vol 13 (2) ◽  
pp. 50
Author(s):  
Hamed Z. Jahromi ◽  
Declan Delaney ◽  
Andrew Hines

Content is a key influencing factor in Web Quality of Experience (QoE) estimation. A web user’s satisfaction can be influenced by how long it takes to render and visualize the visible parts of the web page in the browser. This is referred to as the Above-the-fold (ATF) time. SpeedIndex (SI) has been widely used to estimate perceived web page loading speed of ATF content and a proxy metric for Web QoE estimation. Web application developers have been actively introducing innovative interactive features, such as animated and multimedia content, aiming to capture the users’ attention and improve the functionality and utility of the web applications. However, the literature shows that, for the websites with animated content, the estimated ATF time using the state-of-the-art metrics may not accurately match completed ATF time as perceived by users. This study introduces a new metric, Plausibly Complete Time (PCT), that estimates ATF time for a user’s perception of websites with and without animations. PCT can be integrated with SI and web QoE models. The accuracy of the proposed metric is evaluated based on two publicly available datasets. The proposed metric holds a high positive Spearman’s correlation (rs=0.89) with the Perceived ATF reported by the users for websites with and without animated content. This study demonstrates that using PCT as a KPI in QoE estimation models can improve the robustness of QoE estimation in comparison to using the state-of-the-art ATF time metric. Furthermore, experimental result showed that the estimation of SI using PCT improves the robustness of SI for websites with animated content. The PCT estimation allows web application designers to identify where poor design has significantly increased ATF time and refactor their implementation before it impacts end-user experience.


Author(s):  
Keith Krause

This article evaluates the achievements and limitations of the world organization in the field of disarmament. It stresses the role of the UN as part of the efforts to control arms as a way to achieve international peace and security. It also notes specific cases where progress was achieved or not, as well as the more recent efforts to handle the problems of anti-personnel land mines and small arms and light weapons. The article also tries to draw out some of the broader implications for international relations of the UN experience with formal multilateral arms control, among others.


BMJ Open ◽  
2021 ◽  
Vol 11 (2) ◽  
pp. e043328
Author(s):  
Ildikó Gágyor ◽  
Katrin Rentzsch ◽  
Stephanie Strube-Plaschke ◽  
Wolfgang Himmel

ObjectivesTo validate the urinary tract infection-Symptom and Impairment Questionnaire (UTI-SIQ-8), a questionnaire that consists of four items to assess the symptom severity for dysuria, urgency, frequenc, and low abdominal pain and four items to assess the resulting impairment of activity by UTIs.DesignProspective observation study.SettingGerman primary care practices.ParticipantsAn unselected population of women with UTI. Women could participate online via a web application for smartphones, smartwatches and tablets or use a paper-and-pencil version.Main outcomesPsychometric properties of the UTI-SIQ-8 regarding reliability, validity and sensitivity to change by using factor analysis and multilevel and network analysis.ResultsData from 120 women with a total of 769 symptom reports across 7 days of measurement were analysed. The majority of the participating patients (87/120) used the web application via smartphones or other devices. The reliability of the UTI-SIQ-8 was high, with Cronbach’s alpha of .86 at intake; convergent and discriminant validity was satisfactory. Intraclass correlation demonstrated high sensitivity to change, with 68% of the total variance being due to time differences. These daily changes in an individual’s symptoms moved parallel with daily changes in the EQ-5D-5L (b=1.68, SE=0.12, p<0.001) and the visual analogue scale (b=0.03, SE=0.003, p<0.001), also highlighting convergent validity with respect to daily changes in symptom severity.ConclusionsThe present findings support the UTI-SIQ-8 questionnaire as an economic, reliable and valid instrument for the assessment of symptom severity and symptom change in women with uncomplicated UTI. The web application helped patients to report symptoms on a daily basis. These findings may encourage primary care physicians to use the UTI-SIQ-8 in their daily practice and researchers to apply it to studies involving patients with uncomplicated UTI.


2001 ◽  
Vol 14 (4) ◽  
pp. 789-828
Author(s):  
Keith Wilson

The United States is abrogating the Anti-Ballistic Missile Treaty in order to deploy a limited missile defence shield. Amongst other developments, this is prompting a reconsideration of the global security framework. However, a crucial element is missing from the current missile defence proposals: a clearly articulated concept of peaceful use, applicable both to outer space and to earth-space. The deployment of missile defence runs counter to emerging norms. It has effects going far beyond the abandonment or re-configuration of specific Cold War agreements. In a community of nations committed to the maintenance of international peace and security (cf. national or plurilateral security), sustainable meaning for widely used and accepted norms of peaceful use and peaceful purposes is at risk.


2017 ◽  
Vol 4 (1) ◽  
pp. 18-49 ◽  
Author(s):  
Michaela Martin ◽  
Hussein Solomon

The Islamic State (IS) took the global stage in June 2014 and since has become one of the greatest threats to international peace and security. While initially closely affiliated with Al-Qaeda, the IS has proved itself to be a distinct phenomenon of horror—more dangerous than Al-Qaeda. The group essentially established itself in the volatile Middle East, but has infiltrated many parts of the world with the aim of expanding Islam’s Holy War. What certainly makes the IS different from its predecessors is that the group has been labeled the wealthiest terrorist group in the world today. By the fall of 2015, IS generated an annual income of US$2.4 billion. The question for many analysts observing the situation in Syria is: where does the IS gets its money? The aim of this article is to critically observe the nature of IS and its funding requirements and the measures pursued in curtailing the group’s funding.


Sign in / Sign up

Export Citation Format

Share Document