Browsing by Browse by SEO 2008 "810107 National Security"
- Results Per Page
- Sort Options
- Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication The Arbitral Award in the Matter of the South China Sea between the Philippines and ChinaThis article considers the implications of the Award for freedom of navigation and the use of force in the South China Sea, identifying the conclusions that can be drawn from the Award and the questions that remain. The Award also indirectly raised the question of the use of force to defend navigational rights. This article therefore revisits the Corfu Channel Case for the light it may shed on the use of force and freedom of navigation in the South China Sea. This leads to questions of the danger of miscalculation and the potential importance of the 'Code for Unplanned Encounters at Sea' (CUES) in reducing the potential for miscalculation to occur. This article argues that the de-escalatory approach of CUES may be the way in which States can assert competing rights without such action leading to loss of life.1663 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication As safe as houses?: Commonwealth continuing detention of high risk terrorist offendersThe enactment of the Criminal Code Amendment (High Risk Terrorist Offenders) Act 2016 (Cth),1 a Commonwealth post-expiration of sentence continuing detention scheme for persons convicted of nominated terrorism offences,2 reflects continuing themes in the renewal of Australia's terrorism laws. These matters include the ongoing revision and expansion of terrorism laws, reliance upon executive discretion in moderating the application of laws, diminished human rights analysis in an expedited legislative process, as well as the enactment of laws with significant gaps, requiring post-legislated review and remediation.2245 - Some of the metrics are blocked by yourconsent settings
Publication Open AccessJournal ArticleASIO and economic espionage: The new 'subversion'?Last year, the Joint Parliamentary Committee on ASIO was asked by the Commonwealth Attorney-General to review the organisation's security assessments. ASIO currently screens prospective Commonwealth employees and contractors who may require access in their work to material sensitive to national security interests. The Committee is formally required to: "... review the operation of Part IV of the Australian Security Intelligence Organisation Act 1979 and to report on the manner in which the Organisation performs its function of giving security assessments under that Part, the effectiveness of the procedures established for the purpose of performing that function and the usefulness of assessments so issued." While the terms of the reference are broad, the Chairman of the Committee in announcing the review placed particular emphasis on the need for some wider powers for ASIO. These would enable the organisation to check the commercial backgrounds of government advisers in sensitive policy areas who could harm Australia economically. Although apparently innocuous, changes required to the current legislative framework for security assessments would have implications reaching far beyond the commercial intelligence sphere. Civil liberty concerns such as privacy, association and expression unrelated to harm to Australian economic interests are potentially affected. This is made more probable in the context of ongoing reforms in an intelligence community reacting not only to financial constraints but also to a volatile international political and trade scene. The consequences for domestic civil liberties in allowing ASIO a commercial intelligence role have to date escaped serious discussion.1066 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Assessment of the stability and usefulness of some handwriting features used by document examinersIn this paper we examine the stability of a total of 40 different structural features extracted from four different letters ("y", "d", "f" and "t" ). The one-way analysis of variance (Anova) was used to examine the stability of these features on 3077 samples of letters from 30 different writers. It is concluded that a number of these features exhibit sufficient stability to be useful for handwriting style extraction. With further analysis of features from other letters. and improvement in the measure of such features as loops, it is likely that the features can provide some quantitative measure of the likely authorship of a questioned document.1180 - Some of the metrics are blocked by yourconsent settings
Book ChapterPublication Australia's Traditional Maritime Security Concerns and Post-9/11 PerspectivesAustralia is an island continent which even prior to becoming an independent state upon Federation in 1901 had a rich history in maritime affairs. Since that time Australia has maintained an increasing focus on maritime security, particularly expanding in recent years in response to contemporary events. Part of this interest has been driven by history and Australia's partial inheritance of British traditions and perspectives on maritime affairs, reinforced by the maritime threats Australia faced during World War II such as the battle of the Coral Sea. I It is also driven by geography, given Australia's unique position as the largest island which is also a continent remotely located from many other land masses and with no land bridge to other territories. Every journey undertaken to Australia and, perhaps more significantly for present purposes, all trade must be undertaken by sea or over the sea.1268 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Automatic Extraction of Road Maps: Determining the Sealed Surface(Institute of Electrical and Electronics Engineers (IEEE), 2004) ;Takru, Kalyan ;Bretschneider, Timo RolfThis paper proposes an unsupervised method to obtain road maps from highly resolved (better than 1 m) panchromatic images. As a starting point it is assumed that an incomplete skeletal representation of the road map, i.e. the basic road network, is available. For example this can easily be gained through a straightforward thresholding. In the first step of the road map creation the network is completed using a maximum likelihood extrapolation approach. In a series of evaluations it was shown that this increases the network completeness, on average, by slightly over a tenth of the actual road network. In the second step the network is converted to the road map, i.e. the representation of areas that are part of the actual roads. Again, a maximum likelihood approach was applied with its parameters described through the local neighbourhood. In total completeness and correctness of more than 90% and 95%, respectively, were achieved.1344 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Automatic Quantitative Letter-level Extraction of Features Used by Document ExaminersIn this paper we examine tile automatic extraction of visual or structural features as used by document examiners in the comparison of handwriting samples. We have extracted between 7 and 14 different features from four letters ("y", "d", "f" and "t"). This analysis was earned out on a total of 3077 letters from 30 different writers. On average these features are extracted with about 88% accuracy and can be used to assess the similarity of different writing samples.1078 - Some of the metrics are blocked by yourconsent settings
ReviewPublication Book Review - Guantanamo: What the world should know, by Michael Ratner and Ellen RayThe revelation in 2004 of torture and cruel, inhuman and degrading treatment at the Abu Ghraib prison in Iraq has refocused attention on the legal structures and conditions of the indefinite detention of persons in US military custody at the Guantanamo Bay Naval base in Cuba. Two features are important in this re-focus. In 2003, Major General Geoffrey Miller, the commander of Guantanamo Bay, was sent to Iraq to 'gitmoize ' (ie to apply the Guuantanamo detention management principles) to Abu Ghraib. Secondly, it has become apparent that serious human rights abuses within Us military custody are more properly seen within a context of the ascendancy of asserted US executive power in establishing an extra-legal system of classification and detention, with exceptionialism in that system to international human rights standards.2129 10 - Some of the metrics are blocked by yourconsent settings
ReviewPublication Book Review: 'Calling Out the Troops - The Australian Military and Civil Unrest: The Legal and Constitutional Issues' by Michael Head (Sydney: Federation Press, 2009) pages i-viii, 1-248. Price $49.95 (softcover). ISBN 978-1-86287-709-2.The thought of a civilian passenger jet full of ordinary people flying over Australia being hijacked and then shot down is quite horrific. The shock and horror would most likely amplify if the missile that struck the aircraft launched from an Australian fighter jet or warship. So too, armed troops using lethal force to defend infrastructure such as a power station would be an alien experience for Australia. Amendments to part IIIAAA of the 'Defence Act 1903' (Cth) in 2006 provided these powers to the Australian Defence Force (ADF). There has been some academic debate about this, but not much. Furthermore, there is little to suggest any general public awareness that the Commonwealth Parliament has legislated for the significant destructive power now available to the ADF to be directed at non-military threats. This is the great value of Michael Head's book, 'Calling Out the Troops - The Australian Military and Civil Unrest: The Legal and Constitutional Issues' ('Calling Out the Troops'). Restraining the use of force by the state within its own borders has been a legal issue since the 'Magna Carta', and any development of the legal power for the state to use force should be the subject of debate and scrutiny. It is therefore timely and important that 'Calling Out the Troops' subjects the new statutory powers to critical scrutiny and opens the debate to a potentially wider audience than a journal article might reach. A particularly welcome aspect of 'Calling Out the Troops' is that public debate on military legal issues in Australia is quite limited and many, though not all, of the contributors to this debate have a background in the ADF. This institutional perspective does not appear at all in Head's work and this can only strengthen and deepen debate in this area. While the conclusions that Head draws do not entirely convince this author, the observations that he makes and the questions that he asks in response to them are compelling. This book review will first give a general description of 'Calling Out the Troops' and deal with some of the book's perceived limitations before addressing its conclusion and its main strengths.2317 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Brigitte and the French Connection: Security Carte Blanche or A La Carte?The October 2003 deportation of French terror suspect Willy Brigitte highlights the legal and political usages of recently conferred and controversial counter-terrorism detention and questioning laws. This article explores the executive contention upon a comparison with the French system, Australian detention and questioning powers require significant expansion. Executive usages of the Brigitte incident in response to terrorism display alarming trends steadily eroding rule of law principles and undermining the institutions and practices of Australian democracy. The article analyses ASIO detention and questioning powers and subsequent and possible expansions. It demonstrates that the constant review, re-working and re-visiting of those powers is a more overt politicisation of counter-terrorism responses, employs executive mandated review at the expense of more measured, deliberative and democratic practice and leads to the attrition of rights as the legislation's "balance" is continually contested. The indefinite nature of the terrorism threat and the restraint on such responses as political only, in the absence of a bill of rights, makes these developments of real concern. The article argues, through several illustrations, that claims for expanded detention and questioning powers have been inappropriately presented. The article concludes that there is neither a rational nor substantiated case for the claim to loosen constraints on already unprecedented counter-terrorism detention and questioning powers.1072 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Collision and impact force computation for virtual reality applications(Institute of Electrical and Electronics Engineers (IEEE), 2003) ;Khor, A K; Maskell, D LThis paper is concerned with the accurate detection of collision and the resulting impact force between the model of a person's hand and a static or moving object. The objective is to provide accurate feedback of touch in virtual reality applications. The methods described and evaluated use a combination of bounding sphere and recursive subdivision of the bounding box techniques to detect accurately when and where a collision occurs on the hand. The impact force of the collision is calculated using the geometry of the impact area and application of Newton's law. The methods are verified using a novel prototype of a hand controlled by a six degrees of freedom tracker glove and ball. The ball and hand can collide either by the ball hitting the hand, the hand hitting the ball or both. When inexpensive accurate touch transducers become available to complement the 3D body position input devices, many innovative applications can be realized by applying these methods.1227 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Combining Novel Acoustic Features using SVM to Detect Speaker Changing Points(Institute for Systems and Technologies of Information, Control and Communication (INSTICC), 2008) ;Zhong, Haishan ;Cho, David ;Pervouchine, VladimirAutomatic speaker change point detection segments different speakers from continuous speech according to speaker characteristics. This is often a necessary step before applying speaker verification or identification systems. Among the features to represent a speaker in the speaker change point detection systems acoustic features are commonly used. Commonly used features are Mel Frequency Cepstral Coefficients (MFCC) and Linear Prediction Cepstral Coefficients (LPCC). However, the features are affected by speech content, environment, type of recording device, etc. So far, no features have been discovered, which values depend only on the speaker. In this paper four novel feature types proposed in recent major journals and conference papers for speaker verification problem, are applied to the problem of speaker change point detection. The features are also used to form a combination scheme via SVM classifier. The results shows that the proposed scheme improves the performance of speaker changing point detection as compared to the system that uses MFCC features. It was also found that some of the novel features of low dimensionality give comparable speaker change point detection accuracy to the high-dimensional MFCC features.1315 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Comparative Study of Several Novel Acoustic Features for Speaker Recognition(Institute for Systems and Technologies of Information, Control and Communication (INSTICC), 2008) ;Pervouchine, Vladimir; ;Zhong, Haishan ;Cho, DavidLi, HaizhouFinding good features that represent speaker identity is an important problem in speaker recognition area. Recently a number of new and novel acoustic features have been proposed for speaker recognition. The researchers use different data sets and sometimes different classifiers to evaluate the features and compare them to the baselines such as MFCC or LPCC. However, due to different experimental conditions direct comparison of those features to each other is difficult or impossible. This paper presents a study of five new acoustic features recently proposed. The feature extraction has been performed on the same data (NIST~2001~SRE), and the same UBM-GMM classifier has been used. The results are presented as DET curves with equal error ratios indicated. Also, an SVM-based combination of GMM scores produced on different features has been made in hope that classifier fusion can result in higher speaker recognition accuracy. The results for different features as well as for their combinations are directly comparable to each other and to those obtained with the baseline MFCC features.947 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Comparison of Some Thresholding Algorithms for Text/Background Segmentation in Difficult Document Images(Institute of Electrical and Electronics Engineers (IEEE), 2003); ;Yan, Chen ;Takru, Kalyan ;Tan, Joie Hadi NataMian, LiA number of techniques have previously been proposed for effective thresholding of document images. In this paper two new thresholding techniques are proposed and compared against some existing algorithms. The algorithms were evaluated on four types of difficult document images where considerable background noise or variation in contrast and illumination exists. The quality of the thresholding was assessed using the Precision and Recall analysis of the resultant words in the foreground.The conclusion is that no single algorithm works well for all types of image but some work better than others for particular types of images suggesting that improved performance can be obtained by automatic selection or combination of appropriate algorithm(s) for the type of document image under investigation.1134 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Contesting Exclusion: Uneven Development and the Genesis of the Sudan's Darfur War(Guild of Independent Scholars, 2011)Badmus, Isiaka A"The present disastrous situation in Darfur is the outcome of a complex web of underdevelopment, ecological, political, social, and security factors..." (Hamad, Z.M. Mohammed [n.d].) The civil war in the Sudan's Darfur region has been on the world's agenda for quite sometime now. But the solutions to the conflict are far from sight due to the multiplicity of actors and multiple competing interests that are involve. Compounding the volatile military-political situation and its accompanied complex emergencies is that the responses of the international community have been vague and not encourage enough. Additionally, Darfur is not assisted by the "rushed and ungrounded suggestions on how to best support on-going work for peace and how to reach long lasting political solutions" (Norberg and Brune, 2007: 5). The Darfurian crisis, opposing the Government of the Sudan (GoS) and its proxy militia force (the Janjaweed) on the one hand, and the different regional rebel movements championed by the Sudan Liberation Movement/Army (SLM/A), and the Justice and Equality Movement (JEM) on another hand1, has resulted in the stupendous loss of lives and property. Between February 2003 when the war started and 2009, the conflict had produced hundreds of thousands of deaths, more than 2 million displaced (Liegeois, 2009), while mass raping, gangsterism, etc, are now the 'normal' ways of life in this 'highly unfortunate' region.1038 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Critical Technological Issues of Commercializing a Pitman Shorthand Recognition System(Institute of Electrical and Electronics Engineers (IEEE), 2005) ;Yang, Ma; ;Higgins, ColinHtwe, Swe MyoPitman shorthand has been shown to possess unique advantages as a means of fast text entry on hand-held devices. Based on previous academic achievements, this paper discusses critical issues in the commercialization of Pitman shorthand online reorganization system from the technological perspective. In this paper, critical technological issues are classified into two aspects. These critical issues are illustrated by an entire online simulating system which realizes all core functions from input, through segmentation, recognition to transcription of Pitman shorthand.1186 - Some of the metrics are blocked by yourconsent settings
Publication Open AccessBookCrown and Sword: Executive Power and the Use of Force by the Australian Defence ForceThe Australian Defence Force (ADF) has considerable power at its disposal. It is physically more powerful than any other organisation in Australia. This is hardly surprising when it has the task of defending the country, conducting warlike and peacebuilding operations overseas, enforcing maritime legislation, and providing a degree of internal security. Yet only a minor proportion of this activity is authorised by an Act of Parliament. In fact, some of the more extreme powers currently exercised by the ADF, such as the offensive use of lethal force, deliberate destruction of property, interception of shipping and detention of civilians, are actually contrary to some Acts of Parliament. The authority for such activity lies elsewhere. The scant literature on this topic in Australia would identify the executive power of the Commonwealth as the source of this extraordinary authority whether it is to invade Iraq in 2003, to conduct warlike operations in Afghanistan since 2001, to bomb Syria since 2015, to board shipping in the Arabian Gulf since 1990, to counter piracy off Somalia since 2009,to fly combat air patrols to protect visiting dignitaries in 2002 and 2003 or to occupy East Timor in 1999. In some senses, executive power as a source of authority for ADF operations is a new question.2671 2 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Decompose algorithm for thresholding degraded historical document imagesNumerous techniques have previously been proposed for single-stage thresholding of document images to separate the written or printed information from the background. Although these global or local thresholding techniques have proven effective on particular subclasses of documents, none is able to produce consistently good results on the wide range of document image qualities that exist in general or the image qualities encountered in degraded historical documents. A new thresholding structure called the decompose algorithm is proposed and compared against some existing single-stage algorithms. The decompose algorithm uses local feature vectors to analyse and find the best approach to threshold a local area. Instead of employing a single thresholding algorithm, automatic selection of an appropriate algorithm for specific types of subregions of the document is performed. The original image is recursively broken down into subregions using quad-tree decomposition until a suitable thresholding method can be applied to each subregion. The algorithm has been trained using 300 historical images obtained from the Library of Congress and evaluated on 300 'difficult' document images, also extracted from the Library of Congress, in which considerable background noise or variation in contrast and illumination exists. Quantitative analysis of the results by measuring text recall, and qualitative assessment of processed document image quality is reported. The decompose algorithm is demonstrated to be effective at resolving the problem in varying quality historical images.1142 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Decompose-Threshold Approach to Handwriting Extraction in Degraded Historical Document ImagesHistorical documents contain important and interesting information. A number of techniques have previously been proposed for thresholding document images. In this paper a new thresholding structure called the decompose-threshold approach is proposed and compared against some existing global and local algorithms. The proposed approach is a local adaptive analysis method, which uses local feature vectors to find the best approach for thresholding a local area. Appropriate algorithm(s) are selected or combined automatically for specific types of document image under investigation. The original image is recursively broken down into sub-regions using quad-trees until an appropriate thresholding method can be applied to each of the sub-region. The algorithm has been evaluated by testing on 10 historical images obtained from the Library of Congress. Evaluation of the performance using 'recall' value demonstrates that the approach outperforms any existing single methods.1132 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Deriving filter parameters using dual-images for image de-noising(Institute of Electrical and Electronics Engineers (IEEE), 2007) ;Wang, Lingyu; Cho, Siu-YeungThis paper presents a novel technique to derive the filter parameters for removing signal dependent noise (SDN) in the image. In order to remove SDN, many de-noising algorithms rely on a priori knowledge of noise parameters, especially the variance sigman², and the gamma value gamma of the specific imaging technique. This paper proposes a technique to automatically derive the signal variance sigmaf² and use this parameter to construct the 'Local Linear Minimum Mean Square Error' (LLMMSE) filter without the need to know the values of sigman² and gamma. Two image instances of the same noisy scene are used to calculate the signal variance which is then used to construct the LLMMSE filter. Experiments with both the "Lena" image and real-life far-infrared (FIR) vein pattern images showed that the proposed technique can predict the signal variance consistently, and the constructed LLMMSE filter performs well in removing the signal dependent noise.969 - Some of the metrics are blocked by yourconsent settings
Publication Open AccessJournal ArticleDesigner Intelligence or Legitimate Concern?: Establishing an Office of National Intelligence and Comprehensively Reviewing the National Intelligence Community Legal FrameworkThe establishment of an Office of National Intelligence (ONI) to collect, co-ordinate, integrate and share intelligence from a variety of sources signals a significant new intelligence facilitative role in Commonwealth governance. The ONI Act provides a reformative framework for implementing the prospective recommendations of the Comprehensive Review of the legal framework governing the National Intelligence Community (NIC). This may well produce an increased securitisation of the Australian polity, a broadened intelligence use and interoperability, and a transformative impact beyond rationally justified national security protective definitions. Harmonising intelligence activities across the NIC may be aided through a Government discourse of safety and security, and the absence of a Charter of Rights to reconcile public policy contestations through criteria of legality, necessity, proportionality and related jurisprudence, from other comparable liberal democratic states.2278 5 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Detaining Questions or Compromising Constitutionality?: The ASIO Legislation Amendment (Terrorism) Act 2003 (Cth)The extensively amended 'Australian Security Intelligence Organisation Legislation Amendment (Terrorism) Act 2003' (Cth) ('ASIO (Terrorism) Act 2003'), having first been introduced into Parliament in March 2002, was eventually passed after a Government 'compromise' aimed at achieving Opposition support. The final version of the legislation is remarkable not only because the Commonwealth Parliament has enacted a secret, renewable, incommunicado regime of detention and questioning of persons not suspected of any terrorism offence (for the purposes of the gathering of intelligence), but also because significant questions of constitutionality persist following the June 2003 amendments made to the Bill. This article commences with a discussion of several contextual matters providing important background for an examination of the Act's constitutionality.1061 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Document Examiner Feature Extraction: Thinned vs. Skeletonised Handwriting Images(Institute of Electrical and Electronics Engineers (IEEE), 2005) ;Pervouchine, VladimirThis paper describes two approaches to approximation of handwriting strokes for use in writer identification. One approach is based on a thinning method and produces raster skeleton whereas the other approximates handwriting strokes by cubic splines and produces a vector skeleton. The vector skeletonisation method is designed to preserve the individual features that can distinguish one writer from another. Extraction of structural character-level features of handwriting is performed using both skeletonisation methods and the results are compared. Use of the vector skeletonisation method resulted in lower error rate during the feature extraction stage. It also enabled to extract more structural features and improved the accuracy of writer identification from 78% to 98% in the experiment with 100 samples of grapheme "th" collected from 20 writers.1120 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Early Warning and Response for Preventing Radicalization and Violent ExtremismAddressing radicalization and recruitment of youth in violent extremism (VE) has become a principal aim of the policy and programs of what is known as countering violent extremism (CVE). Yet, much of the CVE programs have taken a curative approach with a main focus on addressing consequences of radicalization and extremism once extremist violence is erupted. A preventive approach, which could be cost effective and function as a "threat minimizer," has received less attention by academics and practitioners alike. By understanding the process of radicalization and recruitment of youth into violent extremism as an evolutionary process, preventive mechanisms could be developed and implemented such as community-based early warning and early response systems by engaging local people who bear the brunt of radicalization and extremism in the first place. Because armed conflict and VE share common impetuses of violence such as inequality, socioeconomic exclusion, unemployment, poverty, and lack of security, armed conflicts and VE are increasingly overlapped and at times interconnected. While the nexus between conflict and extremism is a major challenge for practitioners on the ground, preventing violent extremism can, nonetheless, benefit from rich experiences and lessons learned in the field of conflict prevention and peacebuilding vis-à-vis community-based early warning and early response (EWER) systems. Rather than being overtly prescriptive, however, by offering tools and templates of EWER, I aim to stimulate seminal discussion by focusing on both advantages and challenges of the EWER system when transferring its approaches and ideas from the field of conflict prevention to the CVE domain.1311 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Evaluation of Feature Sets in the Post Processing of Handwritten Pitman's Shorthand(Institute of Electrical and Electronics Engineers (IEEE), 2004) ;Htwe, Swe Myo ;Higgins, Colin; Yang, MaInnovative ways to rapidly input text becomes essential in today's world of mobile computing. The paper discusses the computer transcription of handwritten Pitman shorthand as a means of rapid text entry to pen-based computers, particularly from the aspect of linguistic post processing. Feature-to-phoneme conversion is introduced as the first stage of a text interpreter and the application of various production rules based on different pattern structures is discussed. It demonstrates that phoneme ordering is compulsory in dictionary-based transcription and the use of an approximate pattern-matching algorithm resolves the problem of recognition confusion between similar patterns. Experimental results are promising and demonstrate an overall accuracy of 84%.1527 - Some of the metrics are blocked by yourconsent settings
ReportPublication Expert Meeting: The Use of Force in Armed Conflicts: Interplay Between the Conduct of Hostilities and Law Enforcement Paradigms(International Committee of the Red Cross, 2013) ;Gaggioli, Gloria ;Abbott, Kirby ;Libman, Liron ;Ling, Yan ;Lubell, Noam ;Momtaz, Djamchid; ;Nasrallah, Milad ;Piedra Buena, Claudio ;Salmon, Elizabeth ;Sassoli, Marco ;Vianna, Andre ;Chernishova, Olga ;Wood, Michael ;Zwanenburg, Marten ;Chesney, Robert ;Goldman, Robert ;Gomez Ramirez, Juan Carlos ;Gross, Richard ;Heyns, Christof ;Jackson, Richard ;Kretzmer, DavidInternational Committee of the Red Cross (ICRC): SwitzerlandThe operational and legal environment just described has led the ICRC to conclude that there is a need to clarify the types of cases in which the use of force falls within the conduct of hostilities or, by contrast, within that of law enforcement. For this reason, and as part and parcel of the activities of the ICRC in order to reaffirm and clarify IHL and its interplay with other bodies of international law, the ICRC organised an expert meeting in January 2012 whose objective was to examine the issue by discussing five case studies that were developed to illustrate some of the concrete legal and practical issues that arise in the field. The case studies portray situations taking place in the context of non-international armed conflicts but the lessons drawn from these cases can to a large extent be applied in international armed conflicts as well. The meeting also tackled the issue by adopting a broad perspective. Issues arising not only at the moment of the execution of an operation (i.e. the actual use of force) but also before and after the use of force - notably questions of planning and investigation were addressed. This report has for objective to provide an account of the fascinating debates that took place during the meeting.2698 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Extraction and analysis of forensic document examiner features used for writer identificationIn this paper we present a study of structural features of handwriting extracted from three characters "d", "y", and "f" and grapheme "th". The features used are based on the standard features used by forensic document examiners. The process of feature extraction is presented along with the results. Analysis of the usefulness of features was conducted via searching the optimal feature sets using the wrapper method. A neural network was used as a classifier and a genetic algorithm was used to search for optimal feature sets. It is shown that most of the structural micro features studied, do possess discriminative power, which justifies their use in forensic analysis of handwriting. The results also show that the grapheme possessed significantly higher discriminating power than any of the three single characters studied, which supports the opinion that a character form is affected by its adjacent characters.1117 1 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Failing The Civilian Response? Defence Amendment (Call Out of the ADF) Act 2018 (Cth)The Act emerged as a consequence of the Review of Defence Support to National Counter Terrorism Arrangements announced in July 2017, reviewing, inter alia, the Part II A of the Defence Act 1903 (Cth) call out powers. The Review was initiated in response to the changing nature of overseas terrorist threat examples. It coincided with the conduct and reporting by the NSE Coroner inquiry into the tragic Lindt Cafe siege, which provided context to the Review. The Coronial report concluded that the call out preconditions under the existing legislation had not been met; acknowledged that the Commonwealth had commenced a review of ADF support to domestic counter-terrorism operations, providing an opportunity to review the call out threshold; and it was necessary to confer with state and territory governments about the call out criteria.2006 13 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Fast solution of large N x N matrix equations in an MIMD-SIMD hybrid systemIn this paper, we propose a new high-speed computation algorithm for solving a large N x N matrix system using the MIMD–SIMD Hybrid System. The MIMD–SIMD Hybrid System (also denoted as Hybrid System in this paper) is a new parallel architecture consisting of a combination of Cluster of Workstations (COWs) and SIMD systems working concurrently to produce an optimal parallel computation. We first introduce our prototype SIMD system and our Hybrid System setup before presenting how it can be implemented to find the unknowns in a large N x N linear matrix equation system using the 'Gauss–LU' algorithm. This algorithm basically performs the 'Divide and Conquer' approach by breaking down the large N x N matrix system into a manageable 32 x 32 matrix for fast computation.1102 - Some of the metrics are blocked by yourconsent settings
Publication Open AccessBook ChapterFingerprint Matching using A Hybrid Shape and Orientation DescriptorMinutiae-based methods have been used in many commercial fingerprint matching systems. Based primarily on a point pattern matching model, these methods rely heavily on the accuracy of minutiae extraction and the detection of landmarks like core and delta for pre-alignment. Spurious and missing minutiae can both introduce errors in minutiae correspondence. Equally problematic is the inability to detect landmarks to guide pre-alignment. Taken together, these problems lead to sub-optimal matching accuracy. Fortunately, the contextual information provided by ridge flow and orientation in the neighborhood of detected minutiae can help eliminate spurious minutiae while compensating for the absence of genuinely missing minutiae both before and during matching. In addition, coupled with a core detection algorithm that can robustly handle missing or partially available landmarks for pre-alignment, significant improvement in matching accuracy can be expected. In this chapter, we will firstly review fingerprint feature extraction, minutiae representation, and registration, which are important components of fingerprint matching algorithms. Following this, we will detail a relevant fingerprint matching algorithm based on the Shape Context descriptor found in Kwan et al. (2006). Next, we will introduce a novel hybrid shape and orientation descriptor that is designed to address the above problems. The hybrid descriptor can effectively filter out spurious or unnatural minutiae pairings while simultaneously using the additional ridge orientation cues in improving match score calculation. In addition, the proposed method can handle situations where either the cores are not well defined for detection or the fingerprints have only partial overlapping. Lastly, experiments conducted on two publicly available fingerprint databases confirm that the proposed hybrid method outperforms other methods included in our performance comparison.1149 1 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Fingerprint Matching using Orientation and Enhanced Shape Context Descriptors(2010) ;Abraham, JoshuaThe unique physiological characteristics along with high collectability and permanence attributed to fingerprint patterns have allowed fingerprint identification to be a highly effective tool in performing human identification and authentication. In recent times, Automatic Fingerprint Recognition Systems (AFRS) have encountered widespread applications in forensics, commercial/industrial systems, and consumer products. Along with high tolerance toward image quality and accurate feature detection, such systems have the additional requirement of robust and highly accurate matching algorithm(s) that deal with performance deteriorating aspects such as skin distortion, dirt, scaring, spurious minutiae, and near disjoint region overlap. Recently, the shape context descriptor was applied in [1] for minutiae-based fingerprint matching following the model of maximal correspondence. This was achieved first by an alignment process using a novel greedy algorithm and Thin Plate Spline (T.P.S) transformation, followed by the computation of a matching score. Careful analysis revealed that minutiae-based matching algorithms like [1] strongly depend on the accuracy of minutiae extraction. Spurious and missing minutiae can both affect the result of minutiae correspondence, thereby degrading the overall matching accuracy. In this paper, two new variants of a robust fingerprint matching algorithm by integrating the shape context and a local ridge orientation descriptor are proposed. Experimental results on FVC2002 and University of Bologna databases confirm that the new algorithm achieves a significant improvement in overall matching accuracy, out performing many other well known algorithms despite minimal attention toward spurious minutiae removal.939 - Some of the metrics are blocked by yourconsent settings
BookPublication Freedom of Navigation and the Law of the Sea: Warships, States and the Use of ForceThere has been a recent increase in clashes between warships asserting rights to navigate and states asserting sovereignty over coastal waters. This book argues for a set of rules which respect the rights of coastal states to protect their sovereignty and of warships to navigate lawfully, whilst also outlining the limits of each.
The book addresses the issue of the clash between warships and states by considering the general principles applying to use of force in the law of the sea and the law of national self-defence. It focuses on the right of coastal states to use force to prevent passage of warships which threaten their sovereignty, with particular reference to the specific maritime zones, as well as by warships to ensure passage or to defend themselves. The book also assesses the extent to which the law of armed conflict may be applicable to these issues. The conclusion draws together a set of rules which take account of both contemporary and historical events and seeks to balance the competing interests at stake.
Providing a concise overview of the enduring issue of freedom of navigation, this book will appeal to anyone studying international law, the law of the sea, security studies and international relations. It will also be of interest to naval, coast guard and military officers as well as government legal advisors.1297 4 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Gathered intelligence or Antipodean exceptionalism?: Securing the development of ASIO's detention and questioning regimeThis article takes as its central theme the idea that in developing the Australian counter-terrorism response of the ASIO questioning and detention regime, distinctive, identifiable characteristics have emerged in the Government approach to international and comparative examples necessarily referred and responded to as justifying that development. These characteristics may be conveniently described as the Australianisation of international and comparative counter-terrorism examples, or selective internationalism, and these features are variously manifested in the areas examined in this article.1030 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Gray-Scale Skeletonization of Thermal Vein Patterns Using the Watershed Algorithm in Vein Pattern BiometricsIn vein pattern biometrics, analysis of the shape of the vein pattern is the most critical task for person identification. One of best representations of the shape of vein patterns is the skeleton of the pattern. Many traditional skeletonization algorithms are based on binary images. In this paper, we propose a novel technique that utilizes the watershed algorithm to extract the skeletons of vein patterns directly from gray-scale images. This approach eliminates the segmentation stage, and hence prevents any error occurring during this process from propagating to the skeletonization stage. Experiments are carried out on a thermal vein pattern images database. Results show that watershed algorithm is capable of extracting the skeletons of the veins effectively, and also avoids any artifacts introduced by the binarization stage.1051 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Guiding Light Or Opaque Filter?: The Minister's Guidelines For The Australian Security Intelligence Organisation In Performing Its Functions And Exercising Its Powers As Relevant To SecurityThe issue in 2020 of new ministerial guidelines ('2020 Guidelines') for the performance by the Australian Security Intelligence Organisa-tion ('ASIO') of its functions and the exercise of its powers as relevant to security, after a 13-year interval, is significant as very substantial changes in ASIO's legislation, powers, resources and priorities occurred during that time.
The 2020 Guidelines reveal critical new issues in their review processes, content and operation. These issues should be addressed if the Guidelines are to achieve optimal, integrated and complementary performance as one of several ASIO accountability mechanisms, in turn part of minis-terial responsibility under the chosen Australian parliamentary model of human rights.
There are several pressing reform issues in the 2020 Guidelines, including: the need to improve consultative processes for review and development to match the expanding reach of ASIO security activities; the fact that the 2020 Guidelines authorise classified ASIO policies and thereby provide insufficient public guidance; and, the capacity of the 2020 Guidelines to interpretively enlarge the concept of relevance to security and, in particular, broaden the concept of politically motivated violence.
Further important issues and reforms arise from the treatment by the 2020 Guidelines of exiting or remediating the intelligence gathering process, including the collation and retention of personal information, as well a need to more clearly shape proportionality matters in familiar legal principles. Noticeable deficiencies in the 2020 Guidelines give cause for concern and reflection. Specific and broader reforms to the processes generating, and the content informing, the Guidelines are canvassed throughout the article and in its conclusion. These reforms are intended to improve the presently understated function of the 2020 Guidelines as part of a more integrated and responsive ASIO accountability framework.
500 123 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication Handwritten character skeletonisation for forensic document analysis(Association for Computing Machinery (ACM), 2005) ;Pervouchine, Vladimir; Melikhov, KonstantinA new method of skeletonisation (stroke extraction) of handwritten character images is presented. The method has been designed to extract the skeleton which is very close to human perception of the original pen tip trajectory. The need in such skeletonisation arises from feature extraction algorithms which are sensitive to inaccuracies in positions of skeleton curves. One class of such algorithms are those for extraction of features used in forensic analysis of handwriting. The skeleton is constructed in three steps directly from the grayscale image and is represented as a set of curves, which, in turn, are represented as cubic B-splines. Such representation also eases feature extraction. Experiments have been performed on 150 images of grapheme "th" written by different writers. The assessment of the skeletonisation results are presented.1108 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Handwritten Shorthand and its Future Potential for Fast Mobile Text EntryHandwritten shorthand systems were devised to enable writers to record information on paper at fast speeds, ideally at the speed of speech. While they have been in existence for many years it is only since the 17th Century that widespread usage appeared. Several shorthand systems flourished in the first half of the 20th century until the introduction and widespread use of electronic recording and dictation machines in the 1970's. Since then, shorthand usage has been in rapid decline, but has not yet become a lost skill. Pitman shorthand has been shown to possess unique advantages as a means of fast text entry which is particularly applicable to hand-held devices in mobile environments. This paper presents progress and critical research issues for a Pitman/Renqun Shorthand Online Recognition System. Recognition and transcription experiments are reported which indicate that a correct recognition and transcription rate of around 90% is currently possible.1074 1 - Some of the metrics are blocked by yourconsent settings
Thesis DoctoralPublication Impact of Gender Quotas on Women’s Political Empowerment: A Comparative Study in India and Bangladesh(University of New England, 2022-02-03) ;Prodip, Md Mahbub Alam; Women are a persistently disadvantaged group and far from achieving gender equality, especially in political institutions in developing countries. India and Bangladesh have introduced gender quotas in their local political systems in order to promote more women in politics. Gender quotas have increased the number of women in local councils in both countries. However, the question remains whether the women members elected through gender quotas have created an impact on the treatment of women’s matters and the decision-making process in local councils. This comparative case study examines the impact of gender quotas on women’s political empowerment, as well as the factors that hinder or facilitate women members raising their voices in the decision-making process in local councils – the Gram Panchayat in India and the Union Parishad in Bangladesh. This thesis finds that women in both countries confront some fundamental institutional, cultural and socio-economic barriers to their political empowerment. However, the dimension of these barriers is different in India and Bangladesh. These factors, as well as individual characteristics, assist women to raise their voices to claim public goods and resources for their constituents, and women in general. The findings also reveal that women elected through quotas in both countries are likely to work for women in local-level politics. Indian women are more enthusiastic about offering development services to their electorate, especially the women, than are the quota women in Bangladesh. Women in both countries are more likely than men to offer social welfare services to their constituents, especially women. This thesis supports the arguments of those critics of critical mass who argue that an increase in women’s numbers alone does not have a significant effect in promoting female favourable policies and practical outcomes.
445 6 - Some of the metrics are blocked by yourconsent settings
Conference PublicationPublication An improved smoothed watershed algorithm for gray-scale skeletonization of thermal vein patternsIn vein pattern biometrics, analysis of the shape of the vein pattern is the most critical task for person identification. One of best representations of the shape of vein patterns is the skeleton of the pattern. Many traditional skeletonization algorithms are based on binary images. In this paper, we propose a novel technique that utilizes the watershed algorithm to extract the skeletons of vein patterns directly from gray-scale images. It also utilizes a polynomial curve fitting technique to produce smooth skeletons. This approach eliminates the segmentation stage, and hence prevents any error occurring during this process from propagating to the skeletonization stage. Experiments were carried out on a thermal vein pattern images database. Results show that the watershed algorithm is capable of extracting the smooth skeletons of the veins effectively, and also avoids any artifacts introduced by the binarization stage.970 1 - Some of the metrics are blocked by yourconsent settings
Journal ArticlePublication Infrared imaging of hand vein patterns for biometric purposesA novel non-invasive imaging technique to image the vein patterns in various parts of the hand for biometric purposes is evaluated. Two imaging methods are investigated: far-infrared (FIR) thermography and near-infrared (NIR) imaging. Experiments involving data acquisition from various parts of the hand, including the back of the hand, palm and wrist, were carried out using both imaging techniques. Analysis of the data collected shows that FIR thermography is less successful at capturing veins in the palm and wrist. FIR thermography can capture the large veins in the back of the hand, but it is sensitive to ambient temperature and humidity conditions as well as human body temperature. NIR imaging produces good quality images when capturing veins in the back of the hand, palm and wrist. NIR imaging is also more tolerant to changes in the environment and body condition but faces the problem of pattern corruption because of visible skin features being mistaken for veins. This corruption is not present in FIR imaging. An initial biometric system is investigated to test both FIR and NIR images for biometric purposes. The results show all the subjects were correctly identified, which indicates vein pattern biometrics with infrared imaging is a potentially useful biometric.1185
- «
- 1 (current)
- 2
- 3
- »