446 research outputs found

    Sexual Violence Committed against University of Alaska Students, by Gender

    Get PDF
    This fact sheet presents past year estimates of sexual misconduct and sexual assault victimization against University of Alaska (UA) students both on and off campus. Women- and men-specific estimates are provided for the UA system as a whole only. The results presented here are based on the survey responses of a randomly selected sample of 1,982 undergraduate and graduate students who were enrolled at any of the three UA major administrative units (MAUs) — UA Anchorage (UAA), UA Fairbanks (UAF), or UA Southeast (UAS) during spring semester 2016. This survey was modeled on the Campus Climate Survey Recommendations prepared by the White House Task Force to Protect Students from Sexual Assault.Bureau of Justice Statistics, U.S. Department of JusticeUA Student Population / Sexual Misconduct / Sexual Assault / Results / Violence against women / Violence against men / Summar

    Sexual Misconduct and Sexual Assault Committed against University of Alaska Students

    Get PDF
    This fact sheet presents past year estimates of sexual misconduct and sexual assault victimization against University of Alaska (UA) students. The estimates are based on 1,982 survey responses to the University of Alaska Campus Climate Survey, an online survey that collected data from a random sample of undergraduate and graduate students who were enrolled at UA during spring semester 2016.Bureau of Justice Statistics, U.S. Department of JusticeUA Student Population / Sexual Misconduct / Sexual Assault / Results / Summary / NotesRevised 20 Oct 2016

    University of Alaska Students’ Disclosures of Sexual Misconduct and Sexual Assault Victimizations

    Get PDF
    Complete issue of Alaska Justice Forum 33(1), Spring 2016 at https://scholarworks.alaska.edu/handle/11122/6883.This article uses data collected for the University of Alaska Campus Climate Survey to explore how often University of Alaska (UA) students who experienced sexual misconduct or sexual assault, either on or off campus, disclosed their victimizations to others. The likelihood of victimization disclosure in relation to the type of victimization, the persons or institutions to whom disclosure was made, and the demographic characteristics of UA student victims are also examined.Survey Definitions of Sexual Misconduct and Sexual Assault / Disclosure and Reporting of Sexual Violence Victimization / Nondisclosure of Sexual Violence Victimization / UA Students’ Sexual Misconduct and Sexual Assault Victimization Disclosures / Demographic Factors Related to Disclosure (Age, Race/Ethnicity, Sex/Gender) / Discussion / Clery Act (sidebar) / Uniform Crime Reporting (UCR) Program (sidebar

    UAA Justice Center's Ongoing DVSA Research

    Get PDF
    This Powerpoint presentation describes ongoing research on domestic violence and sexual assault presented to the Alaska Council on Domestic Violence and Sexual Assault (CDVSA) at its June 2017 quarterly meeting. Research discussed includes a recently completed survey on Alaskans’ knowledge, attitudes, and beliefs (KAB) regarding domestic violence and sexual assault; a Results First Initiative cost-benefit analysis of batterer intervention programs; psychological and physical abuse against women 60 and older from the Alaska Victimization Survey (2010-2015) (AVS) with a comparison to national data from the National Intimate Partner and Sexual Violence Survey (2010); and an update on the Alaska Victimization Survey.UPDATE: Survey on Alaskans’ Knowledge, Attitudes, and Beliefs / UPDATE: Results First and Batterer Intervention Programs / UPDATE: Psychological and Physical Abuse Against Elders / UPDATE: Alaska Victimization Surve

    A decision-level fusion strategy for multimodal ocular biometric in visible spectrum based on posterior probability

    Full text link
    © 2017 IEEE. In this work, we propose a posterior probability-based decision-level fusion strategy for multimodal ocular biometric in the visible spectrum employing iris, sclera and peri-ocular trait. To best of our knowledge this is the first attempt to design a multimodal ocular biometrics using all three ocular traits. Employing all these traits in combination can help to increase the reliability and universality of the system. For instance in some scenarios, the sclera and iris can be highly occluded or for completely closed eyes scenario, the peri-ocular trait can be relied on for the decision. The proposed system is constituted of three independent traits and their combinations. The classification output of the trait which produces highest posterior probability is to consider as the final decision. An appreciable reliability and universal applicability of ocular trait are achieved in experiments conducted employing the proposed scheme

    Drone detection in long-range surveillance videos

    Full text link
    © 2019 IEEE. The usage of small drones/UAVs has significantly increased recently. Consequently, there is a rising potential of small drones being misused for illegal activities such as terrorism, smuggling of drugs, etc. posing high-security risks. Hence, tracking and surveillance of drones are essential to prevent security breaches. The similarity in the appearance of small drone and birds in complex background makes it challenging to detect drones in surveillance videos. This paper addresses the challenge of detecting small drones in surveillance videos using popular and advanced deep learning-based object detection methods. Different CNN-based architectures such as ResNet-101 and Inception with Faster-RCNN, as well as Single Shot Detector (SSD) model was used for experiments. Due to sparse data available for experiments, pre-trained models were used while training the CNNs using transfer learning. Best results were obtained from experiments using Faster-RCNN with the base architecture of ResNet-101. Experimental analysis on different CNN architectures is presented in the paper, along with the visual analysis of the test dataset

    Strictly One-Dimensional Electron System in Au Chains on Ge(001) Revealed By Photoelectron K-Space Mapping

    Full text link
    Atomic nanowires formed by Au on Ge(001) are scrutinized for the band topology of the conduction electron system by k-resolved photoemission. Two metallic electron pockets are observed. Their Fermi surface sheets form straight lines without undulations perpendicular to the chains within experimental uncertainty. The electrons hence emerge as strictly confined to one dimension. Moreover, the system is stable against a Peierls distortion down to 10 K, lending itself for studies of the spectral function. Indications for unusually low spectral weight at the chemical potential are discussed.Comment: 4 pages, 4 figures - revised version with added Fig. 2e) and additional reference

    Network anomaly detection by using a time-decay closed frequent pattern

    Full text link
    © 2019 by the authors. Anomaly detection of network traffic flows is a non-trivial problem in the field of network security due to the complexity of network traffic. However, most machine learning-based detection methods focus on network anomaly detection but ignore the user anomaly behavior detection. In real scenarios, the anomaly network behavior may harm the user interests. In this paper, we propose an anomaly detection model based on time-decay closed frequent patterns to address this problem. The model mines closed frequent patterns from the network traffic of each user and uses a time-decay factor to distinguish the weight of current and historical network traffic. Because of the dynamic nature of user network behavior, a detection model update strategy is provided in the anomaly detection framework. Additionally, the closed frequent patterns can provide interpretable explanations for anomalies. Experimental results show that the proposed method can detect user behavior anomaly, and the network anomaly detection performance achieved by the proposed method is similar to the state-of-the-art methods and significantly better than the baseline methods

    ICFHR 2020 Competition on Short answer ASsessment and Thai student SIGnature and Name COMponents Recognition and Verification (SASIGCOM 2020)

    Full text link
    This paper describes the results of the competition on Short answer ASsessment and Thai student SIGnature and Name COMponents Recognition and Verification (SASIGCOM 2020) in conjunction with the 17th International Conference on Frontiers in Handwriting Recognition (ICFHR 2020). The competition was aimed to automate the evaluation process short answer-based examination and record the development and gain attention to such system. The proposed competition contains three elements which are short answer assessment (recognition and marking the answers to short-answer questions derived from examination papers), student name components (first and last names) and signature verification and recognition. Signatures and name components data were collected from 100 volunteers. For the Thai signature dataset, there are 30 genuine signatures, 12 skilled and 12 simple forgeries for each writer. With Thai name components dataset, there are 30 genuine and 12 skilfully forged name components for each writer. There are 104 exam papers in the short answer assessment dataset, 52 of which were written with cursive handwriting; the rest of 52 papers were written with printed handwriting. The exam papers contain ten questions, and the answers to the questions were designed to be a few words per question. Three teams from distinguished labs submitted their systems. For short answer assessment, word spotting task was also performed. This paper analysed the results produced by their algorithms using a performance measure and defines a way forward for this subject of research. Both the datasets, along with some of the accompanying ground truth/baseline mask will be made freely available for research purposes via the TC10/TC11

    Innovative Technics of Managing Engineers' Global Competencies

    Get PDF
    Higher education modernization in the CIS countries takes place under the conditions of dynamic changes in economy and society. These changes are determined by the social and economic development of the country and the world globalization processes - cross-border intercultural communication, knowledge transparency, and the establishment of information society. Educational globalization is a continuous process of creating a unified global educational system, in which the distinctions between its member educational systems are being blended
    corecore