•Broad evaluation of constant Q cepstral coefficients for spoofing detection.•Linearisation of geometric space enables constant Q cepstral processing.•Variable spectro-temporal resolution key to ...detection performance.•State-of-the-art performance across three standard databases.•Cross-database results point towards new approach for generalisation.
Recent evaluations such as ASVspoof 2015 and the similarly-named AVspoof have stimulated a great deal of progress to develop spoofing countermeasures for automatic speaker verification. This paper reports an approach which combines speech signal analysis using the constant Q transform with traditional cepstral processing. The resulting constant Q cepstral coefficients (CQCCs) were introduced recently and have proven to be an effective spoofing countermeasure. An extension of previous work, the paper reports an assessment of CQCCs generalisation across three different databases and shows that they deliver state-of-the-art performance in each case. The benefit of CQCC features stems from a variable spectro-temporal resolution which, while being fundamentally different to that used by most automatic speaker verification system front-ends, also captures reliably the tell-tale signs of manipulation artefacts which are indicative of spoofing attacks. The second contribution relates to a cross-database evaluation. Results show that CQCC configuration is sensitive to the general form of spoofing attack and use case scenario. This finding suggests that the past single-system pursuit of generalised spoofing detection may need rethinking.
Microarchitectural vulnerabilities, such as Meltdown and Spectre, exploit subtle microarchitecture state to steal the user’s secret data and even compromise the operating systems. In recent years, ...considerable discussion lies in understanding the attack-defense mechanisms and exploitability of such vulnerabilities. Unfortunately, there have been few investigations into a systematic elaboration of threat models, attack scenarios and requirements, and defense targets of the resulting attacks. In this article, we fill this gap and make the following contributions. We first propose two sets of taxonomies for classifying microarchitectural timing side-channel attacks and their countermeasures according to various attack conditions. Based on the taxonomies proposed, we then review published attacks and existing defenses and systematically analyze their internals. In particular, we also provide a comprehensive analysis of the similarities and differences among those attacks, uncovering the corresponding practicality and severity by identifying the attack targets/platforms and the security boundaries that can be bypassed to reveal information. We further examine the scalability of those defenses through specifying expected defense goals and costs. We also discuss corresponding detection methods based on different classifications. Finally, we propose several key challenges of existing countermeasures and the attack trends, and discuss directions for future research.
Autonomous vehicles (AVs) attract a lot of attention recently. They are expected to assist/replace the human drivers in maneuvering the vehicle, thereby reducing the likelihood of road accidents ...caused by human error, as a means to improve the road traffic safety. However, AVs have their inherent safety and security challenges, which have to be addressed before they are ready for wide adoption. This paper presents an overview of recent research on AV safety failures and security attacks, as well as the available safety and security countermeasures.
•We identify risk factors affecting pedestrian crash injury severity in Florida.•Two locations are analyzed, signalized and unsignalized intersections.•We apply the mixed logit modeling ...approach.•Standard crosswalks experience 1.36% reduction in severity at unsignalized intersections.•At-fault pedestrians are more vulnerable of severe injuries at unsignalized intersections.
This study identifies and compares the significant factors affecting pedestrian crash injury severity at signalized and unsignalized intersections. The factors explored include geometric predictors (e.g., presence and type of crosswalk and presence of pedestrian refuge area), traffic predictors (e.g., annual average daily traffic (AADT), speed limit, and percentage of trucks), road user variables (e.g., pedestrian age and pedestrian maneuver before crash), environmental predictors (e.g., weather and lighting conditions), and vehicle-related predictors (e.g., vehicle type). The analysis was conducted using the mixed logit model, which allows the parameter estimates to randomly vary across the observations. The study used three years of pedestrian crash data from Florida. Police reports were reviewed in detail to have a better understanding of how each pedestrian crash occurred. Additionally, information that is unavailable in the crash records, such as at-fault road user and pedestrian maneuver, was collected. At signalized intersections, higher AADT, speed limit, and percentage of trucks; very old pedestrians; at-fault pedestrians; rainy weather; and dark lighting condition were associated with higher pedestrian severity risk. For example, a one-percent higher truck percentage increases the probability of severe injuries by 1.37%. A one-mile-per-hour higher speed limit increases the probability of severe injuries by 1.22%. At unsignalized intersections, pedestrian walking along roadway, middle and very old pedestrians, at-fault pedestrians, vans, dark lighting condition, and higher speed limit were associated with higher pedestrian severity risk. On the other hand, standard crosswalks were associated with 1.36% reduction in pedestrian severe injuries. Several countermeasures to reduce pedestrian injury severity are recommended.
Recent studies have established that dysregulation of the human immune system and the reactivation of latent herpesviruses persists for the duration of a 6-month orbital spaceflight. It appears ...certain aspects of adaptive immunity are dysregulated during flight, yet some aspects of innate immunity are heightened. Interaction between adaptive and innate immunity also seems to be altered. Some crews experience persistent hypersensitivity reactions during flight. This phenomenon may, in synergy with extended duration and galactic radiation exposure, increase specific crew clinical risks during deep space exploration missions. The clinical challenge is based upon both the frequency of these phenomena in multiple crewmembers during low earth orbit missions and the inability to predict which specific individual crewmembers will experience these changes. Thus, a general countermeasure approach that offers the broadest possible coverage is needed. The vehicles, architecture, and mission profiles to enable such voyages are now under development. These include deployment and use of a cis-Lunar station (mid 2020s) with possible Moon surface operations, to be followed by multiple Mars flyby missions, and eventual human Mars surface exploration. Current ISS studies will continue to characterize physiological dysregulation associated with prolonged orbital spaceflight. However, sufficient information exists to begin consideration of both the need for, and nature of, specific immune countermeasures to ensure astronaut health. This article will review relevant in-place operational countermeasures onboard ISS and discuss a myriad of potential immune countermeasures for exploration missions. Discussion points include nutritional supplementation and functional foods, exercise and immunity, pharmacological options, the relationship between bone and immune countermeasures, and vaccination to mitigate herpes (and possibly other) virus risks. As the immune system has sentinel connectivity within every other physiological system, translational effects must be considered for all potential immune countermeasures. Finally, we shall discuss immune countermeasures in the context of their individualized implementation or precision medicine, based on crewmember specific immunological biases.
We address adaptive detection of coherent signals backscattered by possible point-like targets in presence of thermal noise, clutter, noise-like interferers and, possibly, coherent interferers, i.e., ...deceptive electronic countermeasure (ECM). To this end, we assume a network of radars: for a given cell under test only a subset of the radars receives ECM signals. Training data containing thermal noise, clutter, and noise-like interferers are available. The problem at hand is solved resorting to the generalized likelihood ratio test (GLRT) and to ad hoc solutions: at the design stage we assume that data collected by the radars can be noise only (namely, thermal noise, clutter, and possible noise-like interferers) plus possible coherent interferers or noise plus coherent useful signal. The performance assessment shows that the proposed solutions are effective in presence of ECM systems.
Abstract
As an effective jamming method, towed radar active decoy, poses a great threat to monopulse radar seekers, and has attracted more and more attention from various countries. This article ...analyzes the interference mechanism and main parameters of towed radar active decoys, and provides a theoretical basis for the use of towed decoys. In view of its technical characteristics, combined with technical and tactical countermeasure strategies and technical approaches, research the test range to carry out countermeasures against towed radar active decoys, and provide theoretical basis and reference value for the use of towed radar active decoy countermeasures in the range.
Due to the rapid progress of electronic countermeasures (ECMs), the corresponding means of electronic counter countermeasures (ECCMs) are urgently needed. Due to its range-dependent feature, ...frequency diverse array (FDA) radar technology possesses the application potential for mainlobe jamming suppression. However, the construction of the jamming model for FDA radar is a critical and challenging problem that has not been sufficiently studied. In this article, based on the exact understandings of the time parameter and time-range relationship, the existing deceptive jamming models are analyzed and the correct modeling process is concluded. Furthermore, the complete signal processing flow related to the range parameter in the FDA radar is presented. Consequently, a novel deceptive jamming (NDJ) approach for FDA radar is proposed. NDJ can obtain the same beamforming gain as the target to avoid being suppressed at the beamforming level. Subsequently, effective deceptive jamming can be generated at different range bins to degrade the detection performance of the radar. Simulation examples demonstrate the effectiveness of our proposed method.
Corruption is a crime that harms state finances and the people's economy. On KPK website, cases of budget misuse data based on region, from 2004 to 2021 there are as many as 402 cases. So, ...extraordinary enforcement and extraordinary measures are needed. The research purpose is to analyze the regulation of corruption crimes committed during natural disasters, analyze the weaknesses of regulation corruption in social assistance funds, and analyze the prevention of corruption during natural disasters. This study uses statute approach with secondary legal literature research techniques and uses prescriptive analysis. The result of this journal is regulation of Corruption Crimes during natural disasters is regulated in Law Number 24 of 2007 about Disaster Control, Law Number 31 of 1999 about Eradication of Corruption Crimes, and PERPU Number 24 of 1960 about Investigation, Prosecution and Examination of Corruption Crimes. Provisions for the death penalty are regulated in Article 2 paragraph 2 Law Number 31 of 1999, namely in event that criminal act of corruption as referred to in paragraph (1) is committed under certain circumstances, the death penalty can be imposed, and prevention of corruption during a natural disaster can be carried out by penal and non-penal.
This study describes the model settlement of cases through non-penal channels for crimes committed by children according to Act 11 of 2012 concerning the Juvenile Criminal Justice System with ...prioritizing restorative justice so that children who commit crimes are not stigmatized negatively. The Juvenile Criminal Justice System concept has included solving problems in a family manner or for children in conflict with the law, formally known as diversion. Diversion exists to divert the settlement of child cases from the criminal justice process to processes outside criminal justice. Diversion exists to prevent children who conflict with the law from the negative impacts of the criminal justice process on children. United Nations Standard Minimum Rules for the Administration of Juvenile (The Beijing Rules) have provided guidelines to prevent children in conflict with the law from negative impacts, namely by giving law enforcers the authority to take action in handling or resolving the problems the child offenders by not taking courts, among others stopping or not continuing or releasing or returning or handing over to society and other forms of social service activities.How to cite item: Kaimuddin, Arfan, and Hisbul Luthfi Ashsyarofi. “Model Countermeasures Children Who Commit Crimes in Review Restorative Justice.” Jurnal Cakrawala Hukum 14 no. 2(2023): 134-145. DOI: 10.26905/v14i2.10783.