To see the other types of publications on this topic, follow the link: Authorized person.

Journal articles on the topic 'Authorized person'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Authorized person.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ainala, Aishwarya, G. Soumya Sree, K. Hema Latha, and Dr G. Murugan. "Interactive Computer System Using Hand Gestures." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 439–43. http://dx.doi.org/10.22214/ijraset.2023.49456.

Full text
Abstract:
Abstract: This paper proposes a way to control the position of cursor with the bare hands without using any electronic device. While the operations like clicking and dragging of objects will be performed with different hand gestures. Only authorized persons can access the system by using facial recognition. Face recognition tracks target objects in live video images taken with a video camera. This application is based on face detection, feature extraction and recognition algorithms, which automatically detects the human face when the person in front of the camera recognizing the person. If the
APA, Harvard, Vancouver, ISO, and other styles
2

Tonpe, Tejas, Tejas Saggam, Nutan Limbare, and Prof Sagar Pokharkar. "Face Detection and Recognition Using Raspberry Pi." International Journal for Research in Applied Science and Engineering Technology 11, no. 8 (2023): 1992–95. http://dx.doi.org/10.22214/ijraset.2023.55510.

Full text
Abstract:
: The face detection and recognition system using Raspberry Pi is a security system that uses advanced algorithms to detect and recognize faces. The system is designed to authorize access to individuals with authorized faces and deny access to unauthorized individuals. The system integrates with a door lock, and if an authorized face is detected, the door lock is automatically opened. If an unauthorized face is detected, a buzzer is activated to notify security personnel, and an email is sent to an authorized person to alert them of the security breach. The system requires high accuracy in fac
APA, Harvard, Vancouver, ISO, and other styles
3

Kotlubaeva, K. S. "Characteristics of Offender’s Personality who Committs False Suggestion of the Court or Other Authorized Agency." Law and Safety 75, no. 4 (2019): 65–70. http://dx.doi.org/10.32631/pb.2019.4.09.

Full text
Abstract:
Particular attention has been paid on the necessity and urgency of developing a methodology for investigating the false suggestion of the court or other authorized agency, where a compulsory element of the criminalistic characteristic is the offender’s personality.
 It has been offered to divide the basic data about a person who commits false suggestion of the court or other authorized agency into the following groups: 1) biological: age, sex, anatomical and physiological qualities; 2) social: education, employment, marital status, criminal experience, communication with the person who co
APA, Harvard, Vancouver, ISO, and other styles
4

Zahyhynei-Zabolotenko, Zoe, and Paul Demiak. "THE CONCEPT OF «CONFLICT OF INTEREST» IN THE LEGAL POSITIONS OF SUPREME COURT." Slovo of the National School of Judges of Ukraine, no. 4(37) (July 7, 2022): 110–26. http://dx.doi.org/10.37566/2707-6849-2021-4(37)-9.

Full text
Abstract:
The article is sanctified to the problem of understanding the concept «conflict of interest» and its characteristics in the legal positions of Administrative Court of Cassation as a part of Supreme Court of Ukraine. It is educed that such that such legal positions touch the correct definition of characteristics of private interest, potential and real conflict of interest, finding out people who are subordinated to a person who is authorized to perform state or local self-government functions, and it can causes potential or real conflict of interest. In particular,in legal positions of Supreme
APA, Harvard, Vancouver, ISO, and other styles
5

Gurzhii, R. "Some issues for implementing the requirements for good practices (GxP). Good distribution practice (GDP) (Part 2)." News of Pharmacy, no. 1(101) (February 1, 2021): 44–50. http://dx.doi.org/10.24959/nphj.21.47.

Full text
Abstract:
Aim. To conduct a detailed study of the requirements of good distribution practice. Materials and methods. The analysis of the current Guidelines on good practices (GxP), in particular the Guideline ST-N 42-5.0:2014 of the Ministry of Health of Ukraine “Medicines. Good Distribution Practice” was performed. Interpretations for the implementation of the requirements of good distribution practice based on the experience of audits of distribution companies for GDP compliance with the requirements were proposed. Results and discussion. The dependence of the correct distribution of medicines on the
APA, Harvard, Vancouver, ISO, and other styles
6

Rogalska, V. V., and T. H. Fomina. "Detention of a person under the martial law: grounds and authorized officials for implementation." Analytical and Comparative Jurisprudence, no. 4 (November 27, 2022): 371–76. http://dx.doi.org/10.24144/2788-6018.2022.04.67.

Full text
Abstract:
From the beginning of the armed aggression of the russian federation on the territory of Ukraine, 13 changes and additions have been amended to the Criminal Procedure Code of Ukraine, that were related to the transformation of various institutions of the criminal process, and in particular the institution of detention. The conducted analysis made it possible to understand that the detention of a person by an authorized official without a decision of an investigating judge in conditions of martial law is carried out in accordance with the general procedure specified in Art. 208-213 of the CPC o
APA, Harvard, Vancouver, ISO, and other styles
7

Popovich, I. M. "Feature of the status of a knowledgeable person in criminal proceedings." Uzhhorod National University Herald. Series: Law 3, no. 82 (2024): 111–16. http://dx.doi.org/10.24144/2307-3322.2024.82.3.18.

Full text
Abstract:
The purpose of the article is to define the general concept and functional purpose of knowledgeable persons in any type of judicial proceedings, the classification of such persons and clarification of the structure of special knowledge. Based on the results of the research, it can be stated that in some situations, legal knowledge is implemented in the judiciary by knowledgeable persons depending on their professional competence and the amount of specialized knowledge. It was concluded that the requirement of disinterestedness is not general and cannot be applied to all knowledgeable persons.
APA, Harvard, Vancouver, ISO, and other styles
8

Ms. Monika Soni. "Algorithmic Methodology Based Automobile Theft Detection and Prevention System." International Journal of New Practices in Management and Engineering 2, no. 03 (2013): 06–11. http://dx.doi.org/10.17762/ijnpme.v2i03.18.

Full text
Abstract:
To prevent and identifying the theft problem, smart car is an ultimate solution. When a person enters into car, automatically takes the photos of driver .Using Principal Component analysis algorithm, checks the photos of driver already stored in the database and decide the person is authorized or unauthorized. If the person is authorized, the person can access the vehicle. When the person is unauthorized. Using GSM and MMS modem, send messages to the user’s mobile number and then the car speed gets slow down. The ignition unit of the car can stops and the door cannot open. Using GPS, the locat
APA, Harvard, Vancouver, ISO, and other styles
9

Oprel, Marieke. "Review Authorized Biography Angela Merkel." European Journal of Life Writing 3 (October 14, 2014): R7—R11. http://dx.doi.org/10.5463/ejlw.3.122.

Full text
Abstract:
With Angela Merkel favoured to win the German election again, several political books about the German chancellor were published during 2013. Both in Germany and abroad, observers puzzled over the reasons for the on-going success of Mrs. Merkel, the scientist from East Berlin who became an internationally honoured stateswoman. One book stood out because of the label ‘authorized biography’ on the cover: Angela Merkel. The Chancellor and her world, written by Stefan Kornelius. Whether Merkel asked Kornelius, head of the international section of the Süddeutsche Zeitung, to write a book about her
APA, Harvard, Vancouver, ISO, and other styles
10

Nykyforenko, N. "Subjects of preventing and countering criminal offenses related to corruption: functioning problems and prospects for improving the legal status." Analytical and Comparative Jurisprudence, no. 1 (March 20, 2024): 611–17. http://dx.doi.org/10.24144/2788-6018.2024.01.107.

Full text
Abstract:
The article examines the subjects of prevention and counteraction to criminal offenses related to corruption. The author establishes that these are not only specialized law enforcement and judicial institutions (the National Anti-Corruption Bureau of Ukraine, the Specialized Anti-Corruption Prosecutor's Office, the High Anti-Corruption Court), but also institutions of general jurisdiction (the National Police of Ukraine, courts of general jurisdiction), as well as other entities, including government agencies, various categories of authorized persons, whistleblowers, and civil society institut
APA, Harvard, Vancouver, ISO, and other styles
11

Glumińska-Pawlic, Jadwiga, and Ewelina Żelasko-Makowska. "Public liability of managers medical entities – selected problems." Gubernaculum et Administratio 27, no. 1 (2023): 11–28. http://dx.doi.org/10.16926/gea.2023.01.01.

Full text
Abstract:
Medical entities are, m.in. entrepreneurs within the meaning of the provisions of the Act – Entrepreneurs’ Law, who conduct business activity in all forms provided for its performance. The person authorized to manage such an entity and represent it externally is its manager, who may be a natural person, as well as the management board of a capital company. The entity authorized to manage a medical entity is liable under public law. Liability means an adverse effect for an entity that has violated certain legal norms by its actions, negligence or recklessness. In such a case, it is a question o
APA, Harvard, Vancouver, ISO, and other styles
12

Lazareva, Dariya, and Nataliia Reztsova. "Process of detention in Ukrainian criminal procedure." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 5, no. 5 (2020): 216–22. http://dx.doi.org/10.31733/2078-3566-2020-5-216-222.

Full text
Abstract:
This research paper presents the analysis of essential characteristics of the detention process by an authorized official as an institution of criminal procedure. The author's definition of the concept of detention by an authorized official has been formulated. The authors have proposed to consider the use of this measure to ensure criminal proceedings as a form of proper and immediate response by authorized officials to the discovery of a crime and obtaining primary information that allows to reasonably suspect a person in its commission.
APA, Harvard, Vancouver, ISO, and other styles
13

Fedchyshyn, S. A. "The Authorized Person in the affairs with the European Court of Human Rights: some features of the position in the light of reformation of ukrainian legislation on public service." Analytical and Comparative Jurisprudence, no. 4 (September 11, 2024): 451–55. http://dx.doi.org/10.24144/2788-6018.2024.04.74.

Full text
Abstract:
this article is dedicated to the analysis of certain features of the position of the Authorized Person in the Affairs with European Court of Human Rights in the context of the reformation of Ukrainian legislation on public service. It is noted that a necessary condition for the effective organization and execution of public service in Ukraine is the proper differentiation of state positions into political, administrative, judicial, and patronage, as well as a clear distinction of their legal status. It is emphasized that the position of the Authorized Person in the Affairs with European Court
APA, Harvard, Vancouver, ISO, and other styles
14

RYABZIN, R. A. "PROPERTY RIGHTS AS SUBJECTIVE CIVIL RIGHTS." Gaps in Russian Legislation 17, no. 7 (2024): 57–66. https://doi.org/10.33693/2072-3164-2024-17-7-057-066.

Full text
Abstract:
The article is devoted to the analysis of the legal category of property rights, considered as subjective civil rights. The author focuses on the study of the general category of subjective civil rights. It is noted that the prevailing point of view in the doctrine is the understanding of subjective civil rights as a measure of possible (permissible) behavior of an authorized person. However, this is not the only position of scientists. In particular, many scientists reveal the legal nature of the concept under consideration through the possibility of demanding certain behavior from an obligat
APA, Harvard, Vancouver, ISO, and other styles
15

Surkova, S. "COMPETENCES OF LAW ENFORCEMENT AUTHORITIES IN PROTECTION FROM DOMESTIC VIOLENCE IN KAZAKHSTAN." POLISH JOURNAL OF SCIENCE, no. 51 (June 16, 2022): 24–26. https://doi.org/10.5281/zenodo.6651076.

Full text
Abstract:
In this article we discuss the main functions of the authorized state bodies in addressing issues of protecting a person from domestic violence in Kazakhstan. Also, the system of legislation regulating the protection of a person from domestic violence is briefly described.
APA, Harvard, Vancouver, ISO, and other styles
16

Tsikalo, Volodymyr. "Specific characteristics of corporate rights under Ukrainian legislation." Cuestiones Políticas 40, no. 73 (2022): 633–54. http://dx.doi.org/10.46398/cuestpol.4073.36.

Full text
Abstract:
The article is devoted to the study of the peculiarities of the exercise of corporate rights under the civil law of Ukraine in order to identify their specific characteristics. Through a documentary methodology, close to legal hermeneutics, it was concluded that the participant of a legal entity (company) may have not only corporate rights but also other rights over this legal entity (company). Therefore, it is not enough to say that the rights of a person whose participation is defined in the authorized capital are corporate. It is important that the content of these rights is due to the owne
APA, Harvard, Vancouver, ISO, and other styles
17

Sultan, Abdullah. "In order to long for the release of the perceptive in believing the expenditure claimant Abd al-Rahman ibn Abd al-Karim ibn Ziyad al-Ghaithi al-Maqsari al-Zubaidi al-Shafi`I (D. 975 AH) a study and investigation." Journal of Umm Al-Qura University for Sharia'h Sciences and Islamic Studies, no. 93 (September 5, 2023): 197–210. http://dx.doi.org/10.54940/si42987756.

Full text
Abstract:
The research deals with the study and investigation of the message "In order to yearn for the longing to liberate the perceived in attesting the expenditure claimant" by Abd al-Rahman bin Abd al-Karim bin Ziyad al-Zubaidi al-Shafi'i. It aims to: introduce the scholar Ibn Ziyad (may God have mercy on him), clarify his stature and scientific standing, highlight the message where it has not been achieved before, prove its attribution to Ibn Ziyad (may God have mercy on him), and study his method in it. The researcher studied and investigated the thesis, trying to produce it as it was put forth by
APA, Harvard, Vancouver, ISO, and other styles
18

Charney, Davida. "The centrality of individual petitions in temple rituals: Hannah, Solomon, and first-person psalms." Journal for the Study of the Old Testament 48, no. 4 (2024): 513–38. http://dx.doi.org/10.1177/03090892231201681.

Full text
Abstract:
The centrality of individual petition in ritual practice in the Hebrew Bible is rarely recognized. This article draws connections between legislation for the well-being sacrifice (זבח שלמים‎; Lev. 3; 7.11–36) and individual petitions as presented in biblical narratives and psalms. Hannah’s successful petition for a son (1 Sam. 1.1–2.10) illustrates the petition process and the stakes. Solomon’s dedication of the Temple (1 Kgs. 8) further details the process and authorizes seven types of petitions with equal provision for individuals vs. the nation and for sin-based vs. inexplicable crises. Of
APA, Harvard, Vancouver, ISO, and other styles
19

Khomichov, I. O. "The compliance of the anti-corruption legislation of Ukraine to the person's right to privacy." Legal horizons, no. 22 (2020): 47–51. http://dx.doi.org/10.21272/legalhorizons.2020.i22.p47.

Full text
Abstract:
The article is devoted to the study of the compliance of the rights and obligations of the person authorized to perform the functions of the state or local government to the right to respect for private life, including the submitting and publishing property declaration. The author determines the approaches of national and foreign researchers to the essence of the concept of the right to privacy and concludes that it is a natural right, that includes the right to respect for private and family life, housing and correspondence. The norms of the Constitution of Ukraine and the Convention for the
APA, Harvard, Vancouver, ISO, and other styles
20

Waszczuk-Napiórkowska, Jolanta. "Ustanowienie zarządu sukcesyjnego. Powołanie zarządcy sukcesyjnego." Prawo w Działaniu 44 (2020): 242–58. http://dx.doi.org/10.32041/pwd.4412.

Full text
Abstract:
The article discusses the most important issues related to the establishment of succession management, which is a new institution in Polish law and whose aim is to create conditions for maintaining business continuity after the death of an entrepreneur being a natural person. The first section indicates the purpose for introducing this institution and the reasons for establishing succession management. The second section discusses the requirements that should be met by the succession manager, who temporarily manages the enterprise to be inherited. The third section attempts to answer the quest
APA, Harvard, Vancouver, ISO, and other styles
21

Cheung, Sai-On, Ka-Chi Lam, Schek-Sau Wong, and Sik-Hung Wong. "The Fee Sensitive Risk Exposures of Project Authorized Person in Hong Kong." Construction Economics and Building 1, no. 2 (2012): 65–72. http://dx.doi.org/10.5130/ajceb.v1i2.2877.

Full text
Abstract:
Authorized Persons (AP) play a critical role in the design and construction of building works in Hong Kong. Under the Building Ordinance, design and construction of building works need to be coordinated and monitored by an AP registered with the Buildings Department. Professionally qualified Architects, Engineers and Surveyors are eligible to register as AP after completing the prescribed assessment. In addition, the project AP is often appointed by the project owner to be the project team leader. In these capacities, a project AP is exposed to various risks. This paper seeks to identify the f
APA, Harvard, Vancouver, ISO, and other styles
22

Піскунова, О. Б. "SOME ASPECTS OF IMPLEMENTATION OF THE COMPETENCE OF THE AUTHORIZED DIVISION (AUTHORIZED PERSONS) ON PREVENTION AND DETECTION OF CORRUPTION." Juridical science 2, no. 4(106) (2020): 136–45. http://dx.doi.org/10.32844/2222-5374-2020-106-4-2.17.

Full text
Abstract:
The purpose of the article is that on the basis of the analysis of positions of scientists-administrators and norms of the current legislation it is necessary: first, to find out the meaning of the term competence in activity of public administration bodies issues of prevention and detection of corruption, secondly, to clarify the basic rights and responsibilities exercised by the authorized units (authorized persons) on the prevention and detection of corruption as part of the administrative and legal status of the latter. The relevance of the article is that one of the main problems associat
APA, Harvard, Vancouver, ISO, and other styles
23

Basiuk, L. "Receiving biological samples of a person under the conditions of their voluntary provision." Analytical and Comparative Jurisprudence, no. 4 (September 14, 2023): 446–50. http://dx.doi.org/10.24144/2788-6018.2023.04.72.

Full text
Abstract:
The article draws attention to and conducts an analysis of obtaining biological samples of a person under the condition of their voluntary provision. In the course of the study, it was revealed that during the investigation of criminal offenses there may be a need to obtain biological samples of a person with different characteristics, which can be conditionally divided into three groups: samples-reflections of a person, which include samples-prints: fingers, teeth, feet, lips, any parts of the surface of the human body; samples of functional manifestations of the person, which include samples
APA, Harvard, Vancouver, ISO, and other styles
24

Makans, Leonīds. "SEVERAL TACTICAL AND LEGAL ASPECTS OF PRELIMINARY MEASURES OF SEARCHING MISSING PERSONS." Administrative and Criminal Justice 2, no. 83 (2018): 4. http://dx.doi.org/10.17770/acj.v2i83.3455.

Full text
Abstract:
The article deals with the problems of searching missing persons and inviolability of private life of a person, namely, how proportionate, and reasonable is the publication of sensitive data of a person in the mass media when disappearance of a person reported. Analysis of the statistical indicators of the searching of missing persons gives basis for the conclusion that a significant number (80%) of persons reported as missed, in fact they are not such, but without warning their relatives were absent for various reasons – somewhere stayed late, left their place of residence for other reasons,
APA, Harvard, Vancouver, ISO, and other styles
25

Fomina, T. H. "Cancellation of a preventive measure in connection with the adoption by an authorized body of a decision on the transfer of a suspect, an accused person for exchange as a prisoner of war: procedural order and problematic issues." Bulletin of Kharkiv National University of Internal Affairs 98, no. 3 (2022): 194–205. http://dx.doi.org/10.32631/v.2022.3.18.

Full text
Abstract:
Taking into account the need to regulate the procedure of exchanging persons as prisoners of war within the framework of criminal proceedings, the legislator fully justified and timely regulated this issue by adopting on July 28, 2022 the Law of Ukraine “On Amendments to the Criminal and Criminal Procedural Codes of Ukraine and other legislative acts of Ukraine regarding the regulation of the exchange procedure persons as prisoners of war” No. 2472-IX. The addition of the new Article 201-1 to the Criminal Procedure Code of Ukraine contributed to the establishment of the procedure for the cance
APA, Harvard, Vancouver, ISO, and other styles
26

A., Amali Mary Bastina, and Rama N. "Biometric Identification and Authentication Providence using Fingerprint for Cloud Data Access." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 1 (2017): 408–16. https://doi.org/10.11591/ijece.v7i1.pp408-416.

Full text
Abstract:
The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing, Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generated by entropy value.
APA, Harvard, Vancouver, ISO, and other styles
27

Senotrusova, E. M. "PARTICIPANTS OF CIVIL LEGAL RELATIONS ON PREVENTION OF HARM." Ex jure, no. 1 (2020): 47–60. http://dx.doi.org/10.17072/2619-0648-2020-1-47-60.

Full text
Abstract:
Abstract: the article analyzes the legal status of the participants of the relations on prevention of harm. The author concludes that the potential victim may be an authorized person in any way connected with the activities of the defendant. An obligated person may be a person engaged in a disputed activity. Investigates the nature of objects protected by article 1065 of the Civil code of the Russian Federation. Explores the possibility of protecting the right to receive the reasonably expected. The author pays special attention to the peculiarities of legal relations, when the Prosecutor appe
APA, Harvard, Vancouver, ISO, and other styles
28

Radulova, Natalya. "Contents of the preparing a deceased coronavirus (covid-19) patient’s body for transfer to the pathology department by an authorized healthcare provider standard operating procedure." Medsestra (Nurse), no. 7 (July 1, 2020): 18–20. http://dx.doi.org/10.33920/med-05-2007-03.

Full text
Abstract:
This standard operating procedure (SOP) determines the procedure for preparing the body of a deceased person with a coronavirus infection (COVID-19) for transfer to a pathological department of the authorized medical organization.
APA, Harvard, Vancouver, ISO, and other styles
29

О. Z. Mukhamedjanov. "LEGAL BASIS AND ACTIVITY OF OMBUDSMAN OF THE REPUBLIC OF UZBEKISTAN IN MODERN CONDITIONS." Bulletin of Toraigyrov University. Law series, no. 4,2023 (December 29, 2023): 71–87. http://dx.doi.org/10.48081/hfqv8447.

Full text
Abstract:
The article deals with questions of formation, evolution, legal status and activity of the Authorized Institute of the Republic of Uzbekistan for Human Rights. The evolution of the Authorized Person of the Oliy Majlis of the Republic of Uzbekistan for Human Rights was studied considering the development of the system of human rights protection as well as concrete social-economic conditions and results of legal development in the country. A comprehensive legal analysis of tasks, functions and authorities of the Ombudsman was conducted with comparison of foreign experience. A special importance
APA, Harvard, Vancouver, ISO, and other styles
30

C, Prof Vidyashree. "Vehicle Access Authentication and Driver Safety." International Journal for Research in Applied Science and Engineering Technology 11, no. 12 (2023): 1391–96. http://dx.doi.org/10.22214/ijraset.2023.57547.

Full text
Abstract:
Abstract: This paper aims with the rise in vehicle theft cases, the need for reliable anti-theft devices has become crucial. Existing vehicle lock system, including mechanical locks, car alarms, and GPS tracking, have not been able to effectively reduce theft rates. This project proposes an innovative solution using face detection technology to design and develop an advanced vehicle locking system in real time. The system allows the car module to be initiated either through face detection or by sending a status message from a cell phone. Upon receiving the message, the car module verifies user
APA, Harvard, Vancouver, ISO, and other styles
31

Nykyforenko, N. "Criminological characteristics of persons who have committed crimes provided for in articles 366-2, 366-3 of the Criminal code of Ukrai." Uzhhorod National University Herald. Series: Law 2, no. 79 (2023): 193–202. http://dx.doi.org/10.24144/2307-3322.2023.79.2.29.

Full text
Abstract:
In the article, based on the results of the study of socio-demographic, socio-psychological, moral- psychological and criminal-legal features of the subjects of the crimes provided for in Art. 366-2 and 366-3 of the Criminal Code of Ukraine, a criminological portrait of a person who committed the crimes provided for in Art. 366-2 and 366-3 of the Criminal Code of Ukraine. It was established that most of them are men (56.4%) aged between 30 and 65 (84.6%), citizens of Ukraine (100%), who have a higher education (35.9%) or professional-technical (32%) education, non-convicts (98.7%) both married
APA, Harvard, Vancouver, ISO, and other styles
32

Wilczewska, Joanna. "Collecting, obtaining and preparing reference material for the purpose of identification of a person or a deceased based on visual recordings." Issues of Forensic Science 286 (2014): 76–81. http://dx.doi.org/10.34836/pk.2014.286.6.

Full text
Abstract:
The main aim of this paper is to provide the guidelines for the activities necessary to obtain valuable and fully eligible reference material for the purposes of identification of a person or a dead body based on visual recordings. The paper elaborates on the relation between evidence material and reference (secondary) material. It also proposes a hierarchical categorization of types of reference material. The illustrations present examples of properly prepared reference material (including photographs of a person) containing also evidence material. Moreover, the paper specifies the relevant l
APA, Harvard, Vancouver, ISO, and other styles
33

Tailor, Amita, and Vaibhavi Pandya. "IOT based Smart Door Lock System." International Journal for Research in Applied Science and Engineering Technology 11, no. 3 (2023): 922–26. http://dx.doi.org/10.22214/ijraset.2023.49470.

Full text
Abstract:
Abstract: Security describes protection of life and property. The safety in the house is very important. Besides the traditional method door that used a key can be easily open by not authorized person or burglar if they have the right key. This will allow them to steal the entire valuable thing in the house. Nowadays the telecommunication technologies become wider and more new features exist to make human life better This project will use a Bluetooth feature in mobile phone to automatically open the door so that Bluetooth technology syncs your phone directly with the lock. It wills automatic o
APA, Harvard, Vancouver, ISO, and other styles
34

Pawar, Sagar K., Akash H. Nikam, Bhushan R. Pawar, Srijan Hembram, and Prof Tushar Kaloge. "IOT Based Smart Lock Door System." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 4427–28. http://dx.doi.org/10.22214/ijraset.2024.60998.

Full text
Abstract:
Abstract: Security describes protection of life and property. The safety in the house is very important. Besides the traditional method door that used a key can be easily open by not authorized person or burglar if they have the right key. This will allow them to steal the entire valuable thing in the house. Nowadays the telecommunication technologies become wider and more new features exist to make human life better This project will use a Bluetooth feature in mobile phone to automatically open the door so that Bluetooth technology syncs your phone directly with the lock. It wills automatic o
APA, Harvard, Vancouver, ISO, and other styles
35

Mary Bastina, A. Amali, and N. Rama. "Biometric Identification and Authentication Providence using Fingerprint for Cloud Data Access." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 1 (2017): 408. http://dx.doi.org/10.11591/ijece.v7i1.pp408-416.

Full text
Abstract:
<div><p>The raise in the recent security incidents of cloud computing and its challenges is to secure the data. To solve this problem, the integration of mobile with cloud computing, Mobile biometric authentication in cloud computing is presented in this paper. To enhance the security, the biometric authentication is being used, since the Mobile cloud computing is popular among the mobile user. This paper examines how the mobile cloud computing (MCC) is used in security issue with finger biometric authentication model. Through this fingerprint biometric, the secret code is generate
APA, Harvard, Vancouver, ISO, and other styles
36

Sai Divya, M., and M. Nagabhushana Rao. "Centralized Authentication Smart Locking System using RFID, Fingerprint, Password and GSM." International Journal of Engineering & Technology 7, no. 3.12 (2018): 516. http://dx.doi.org/10.14419/ijet.v7i3.12.16170.

Full text
Abstract:
The primary aim of implemented project is design of the RFID based high security building locking system, fingerprint, GSM technology, and password. In the implemented system, only authorized person can be enter from the building door locking by scanning his card. The implemented building locking system works based on the RFID, Password, GSM and Fingerprint. The Door locking system can be activated for authorized and valid user by scanning his card and unauthorized user enters in the building a Gsm module sent a message to authority unauthorized user entering in the building.
APA, Harvard, Vancouver, ISO, and other styles
37

Мельничук, Р. В. "ADMINISTRATIVE AND LEGAL PRINCIPLES OF INTERACTION NATIONAL AGENCY FOR THE PREVENTION OF CORRUPTION AND THE NATIONAL POLICE IN THE FIELD OF PREVENTION OF CORRUPTION RISKS IN THE ACTIVITIES OF POLICE AUTHORITIES." Juridical science, no. 1(103) (February 19, 2020): 211–17. http://dx.doi.org/10.32844/2222-5374-2020-103-1.25.

Full text
Abstract:
In the article the system of administrative legal acts of the National agency is found out and exposed on questions prevention of corruption in relation to prevention of corruption risks, in particular in activity of the National police of Ukraine. In detail maintenance of orders and decisions is reflected in relation to setting of norms of activity of the authorized subdivisions on questions prevention and exposure of corruption, order of realization provided for by the plan verifications of organization of work from prevention and exposure of corruption in public organs. It is marked that in
APA, Harvard, Vancouver, ISO, and other styles
38

Zhylenko, N. "ON THE ISSUE OF PROSPECTIVE ADMINISTRATIVE AND LEGAL STATUS OF THE PERSON AUTHORIZED TO CARRY OUT ANTI-CORRUPTION EXAMINATION MEASURES IN THE ADMINISTRATIVE PROCESS OF UKRAINE." East European Scientific Journal 1, no. 10(74) (2021): 46–50. http://dx.doi.org/10.31618/essa.2782-1994.2021.1.74.129.

Full text
Abstract:
The proposed article is devoted to a range of debatable issues to outline the desired long-term administrative and legal status of a person legally authorized to evaluate the acts of subjects of power in administrative proceedings to determine the presence or absence of corruption-causing factors. It is noted that the current legal conditions for administrative proceedings in Ukraine complicate the possibility of a fair resolution of some disputes concerning the results of rule-making work of the subjects of power. Emphasis is placed on the urgent need to qualitatively strengthen the role of a
APA, Harvard, Vancouver, ISO, and other styles
39

Pallavi, S. Biradar, and Jatti Anand. "Face and Thumb Based Multimodal Bio-Metric Authentication using Harris Feature Extraction and Stenography." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 550–55. https://doi.org/10.35940/ijrte.C4629.099320.

Full text
Abstract:
In the past recent, identification of a person in an effective manner is a foremost concern for any security authentication in numerous applications such as, banking, e-commerce, communications etc. One of the best identification technology for person identification and authentication compared with the existing password based authentication is the multimodal biometric technology. Multimodal can be defined as, a system which uses two or more biometrics for identification of person. In the paper we propose a multimodal bio-metric system with a unique methodology and features extraction method in
APA, Harvard, Vancouver, ISO, and other styles
40

Gregor, Alexander Aramice, and Qassim Kadhim Jaafar. "Secure Code Generation for Multi-level Mutual Authentication." TELKOMNIKA Telecommunication, Computing, Electronics and Control 16, no. 6 (2018): 2643–50. https://doi.org/10.12928/TELKOMNIKA.v16i6.10437.

Full text
Abstract:
Any secured system requires one or more logging policies to make that system safe. Static passwords alone cannot be furthermore enough for securing systems, even with strong passwords illegal intrusions occur or it suffers the risk of forgotten. Authentication using many levels (factors) might complicate the steps when intruders try to reach system resources. Any person to be authorized for logging-in a secured system must provide some predefined data or present some entities that identify his/her authority. Predefined information between the client and the system help to get more secure level
APA, Harvard, Vancouver, ISO, and other styles
41

KAMUDA, Dorota, and Małgorzata TRYBUS. "CYBERCRIME OF READING INFORMATION OBSTRUCTION UNDER ART. 268 OF PENAL CODE AS A THREAT TO SECURITY OF THE REPUBLIC OF POLAND." Humanities and Social Sciences quarterly 30, no. 4 - part 2 (2023): 107–13. http://dx.doi.org/10.7862/rz.2023.hss.65.

Full text
Abstract:
This article presents issues that determine the protection of the security of the Republic of Poland against the threats posed by computer crime. In particular, it discusses cybercrime under Art. 268 of the Penal Code. The crime of obstructing the reading of information, regulated by Art. 268 § 2, provides for criminal liability of persons whose conduct prevents or significantly impedes the access of an authorized person to important information stored on an IT data carrier. In Art. 268 § 3 of the Penal Code, however, an aggravated type of crime is provided for, which involves causing signific
APA, Harvard, Vancouver, ISO, and other styles
42

Fedchenko, V. M. "Detention of a person under suspicion of committing a criminal offence and the possibility to appeal in criminal proceedings." Law and Safety 91, no. 4 (2023): 95–105. http://dx.doi.org/10.32631/pb.2023.4.08.

Full text
Abstract:
The article analyzes the provisions of the current criminal procedural legislation of Ukraine and separate scientific works in the field of criminal procedure regarding the detention of a person under suspicion of committing a criminal offense without a decision of the investigating judge or a court, especially when the detention of a person under suspicion is carried out by an authorized official at the scene of the crime or immediately after its commission. It is emphasized that in addition to the inquirer, investigator, prosecutor, bodies authorized to carry out a pre-trial investigation, s
APA, Harvard, Vancouver, ISO, and other styles
43

Tsymbalenko, Ya. "THE ORIGIN OF AUTHORIZED PERSON FOR CORRUPTION PREVENTION AND DETECTION INSTITUTE ESTABLISHING IN UKRAINE." Law and public administration, no. 1 (2021): 271–78. http://dx.doi.org/10.32840/pdu.2021.1.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

ONOPKO, K. I. "FORMATION OF THE INSTITUTE OF THE AUTHORIZED PERSON ON PREVENTION AND DETECTION OF CORRUPTION." Law and Society, no. 6 (2023): 271–75. http://dx.doi.org/10.32842/2078-3736/2023.6.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Ibrahim Khalil, Wail. "Interface of Microcontroller Implementation of Voice Recognition for Person Authentication." University of Thi-Qar Journal for Engineering Sciences 4, no. 3 (2013): 77–91. http://dx.doi.org/10.31663/utjes.v4i3.188.

Full text
Abstract:
Voice is used in this proposed for the authentication and display information of registered person and find whom is authorized to be access or not. The reason for choosing voice of human because is considered part of biometric system method and is easily being reproduced by human. Besides that, usage of voice gives control system that be effective and convenient to be used. This proposed involve a simple system that consists of voice recognition software and AT89S52 microcontroller with LCD to build up the system. This work is able to recognize the command trained by the user and successfully
APA, Harvard, Vancouver, ISO, and other styles
46

Gruzdev, Vladislav. "Assumption of the Default Debt by the Obligated Person." Journal of Russian Law 27, no. 10 (2023): 43. http://dx.doi.org/10.61205/jrp.2023.114.

Full text
Abstract:
The institution of debt assumption is traditionally used in domestic civil law to regulate property turnover, which attracts the close attention of representatives of civil science. At the same time, the debt assumption is qualified in different ways: as a unilateral transaction, a legal act, transactionlike actions. Using formal-logical and historical research methods, the author proves that the assumption of the default debt is a unilateral transaction, for which it is necessary and sufficient to express the will of the obligated party. This transaction is made in favor of the opposite side
APA, Harvard, Vancouver, ISO, and other styles
47

Rivandi, Pranoko, Astuti Winda, Dewanto Satrio, and Mahmud Iwan Solihin. "Automotive Start–Stop Engine Based on Fingerprint Recognition System." E3S Web of Conferences 130 (2019): 01022. http://dx.doi.org/10.1051/e3sconf/201913001022.

Full text
Abstract:
Automated vehicle security system plays an important rule in nowadays advance automotive technology. One of the methods which can be applied for a security system is based on biometric identification system. Fingerprint recognition is one of the biometric systems that can be applied to the security system. In this work, fingerprint recognition system to start the motorcycle engine is developed. The fingerprint of the owner and other authorized persons will be stored into the database, then while the time of starting the engine of the vehicle, the fingerprint will be validated with the database
APA, Harvard, Vancouver, ISO, and other styles
48

Kozlova, Natalia V., and Sophia Yu Filippova. "The legal regime of the share in the authorized capital of a limited liability company acquired by spouses during marriage, during the life of the spouses and after the death of one of the spouses." RUDN Journal of Law 28, no. 1 (2024): 145–62. http://dx.doi.org/10.22363/2313-2337-2024-28-1-145-162.

Full text
Abstract:
The authors analyze the legal regime of a share in the authorized capital of a limited liability company acquired during marriage, as well as the legal fate of this share in the event of death of one of the spouses. Acquisition of a share is basic for acquisition of corporate rights to participate in the company. Since the legal regime of joint ownership presupposes the ownership of property without determining the shares of each co-owner, regardless of which spouse is registered in the Unified State Register of Legal Entities, both spouses are members of the company and considered as one subj
APA, Harvard, Vancouver, ISO, and other styles
49

Kryshevych, O. V., та O. O. Melnyk. "Сonceptual aspect of «official person» as a special entity in criminal law". Analytical and Comparative Jurisprudence 3, № 3 (2025): 465–71. https://doi.org/10.24144/2788-6018.2025.03.3.71.

Full text
Abstract:
According to the enshrined Article 21 of the Constitution of Ukraine, all citizens are equal before the law, however, this does not exclude a certain form of inequality before the law based on the provisions of the law itself. Investigating the criminal-legal direction of development of inequalities established by law, cases are analyzed where the law provides that only those persons who, along with the general characteristics of the subject of a criminal offense (reaching the age of criminal responsibility and sanity), must possess some additional characteristics are liable for some criminal
APA, Harvard, Vancouver, ISO, and other styles
50

Choquette, Marie. "Les articles 8, 9 et 10 de la Charte canadienne des droits et libertés." Les Cahiers de droit 25, no. 3 (2005): 677–98. http://dx.doi.org/10.7202/042616ar.

Full text
Abstract:
Legal rights protected under sections 8, 9 and 10 of the Canadian Charter of Rights and Freedoms are the subject of this article. Section 8 affords protection against unreasonable search or seizure; there was no similar provision under the Canadian Bill of Rights. Authorized searches and seizures by warrant will be considered unreasonable whenever minimal standards laid down in section 443 of the Criminal Code have not been respected. Furthermore, searches or seizures without warrant will be judged unreasonable if they do not conform to the legal provisions under which they are authorized. Sec
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!