Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "information analysis" wg kryterium: Temat


Tytuł:
Pierwsze informacje o przestępstwie korupcyjnym a budowa fabuły zdarzenia
The first information about corruption and building a crime story
Autorzy:
Wielki, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/697754.pdf
Data publikacji:
2017
Wydawca:
Uniwersytet Opolski
Tematy:
information analysis
investigation
corruption
crime stories
Opis:
The aim of this article is to point out the possibilities of using the first information about the crime of corruption to build a crime story, although the concept of the story is not much common ground for the practice of inquiry. Corruption crimes are characterized by significant problems of the nature of detection and legal evidential value, which makes it complicated for the authorities conducting proper investigations in the case. In the present study the author points to the essence and methods of creating the storyline of events, while leveraging the scientific achievements in the field of open source intelligence and criminal intelligence. With such a scheme drawn up, it is possible to raise the quality of pre-trial proceedings in cases of corruption, as illustrated by numerous examples.
Źródło:
Opolskie Studia Administracyjno-Prawne; 2017, 15, 3; 39-49
2658-1922
Pojawia się w:
Opolskie Studia Administracyjno-Prawne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Integrated Approach to Information Analysis for Planning the Transport of Sensitive Cargo
Autorzy:
Semenov, Iouri
Filina-Dawidowicz, Ludmila
Trojanowski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/224045.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
transport planning
information analysis
sensitive cargo
planowanie transportu
analiza informacji
wrażliwy ładunek
Opis:
This article presents the methodology of information analysis, required for planning safe road transport of sensitive cargoes. Based on the literature studies we found that the traditional approaches applied to analyze traffic information are insufficient to ensure safe transport of sensitive loads as they fail to take into account several threatening factors. In addition, the need was noted to develop the procedures that may allow to choose a transport route considering appearance of so-called high-risk zones within road infrastructure, analyze the interdependence of such zones with errors made during the design or operation of road infrastructure and investigate the impact of road traffic on the frequency of road accidents involving Heavy Goods Vehicle. Therefore, article aims to present an integrated approach to traffic information analysis. Thus a multiple stage data ordering procedures were proposed, based on grouping information on accident rates and inclusion of audit results of selected route sections. Considering that transport infrastructure plays an important role in transport safety, the proposed methodology includes the analysis of errors in infrastructure and a merger in the sections the detected risk zones within the road infrastructure in any location. Application of this methodology can improve the planning of road transport of sensitive cargoes. Its verification was carried out on the example of a selected route running through Poland. During the audit of the route, it was found that a number of incorrect design solutions were applied on its separate sections, which may lead to high values of the severity factor for potential collisions and indicator of possible post-accidental losses. As a result of the research, the areas of the route were identified, where high-risk zones are located that threaten the safety of road traffic of vehicles, including those carrying sensitive loads. Research results may be of interest for those, who are involved in planning and organization of sensitive cargo transport, both in domestic and in international relations.
Źródło:
Archives of Transport; 2019, 51, 3; 64-76
0866-9546
2300-8830
Pojawia się w:
Archives of Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Information and Analysis System Supporting Risk Management During the Planning and Implementation Stage of Police Activities — the Essence and Possibilities of Use for Teaching Purposes
Autorzy:
Bogdalski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1374883.pdf
Data publikacji:
2018
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
information and analysis system
police operations
emergency situations
police training
Opis:
The article presents the essence and operational potential of the information and analysis system supporting the decision making process within the framework of security-related policing operations. This system is being developed by a scientific consortium led by the Police Academy, Szczytno. The project finance is provided by the National Centre for Research and Development. The main element to ensure the effectiveness of the system in question will be an application with a planning and decision mechanism and prediction algorithms. The above mentioned algorithms are designed to provide information on the probability of success of police operations and on the necessary costs which must be incurred in a given crisis situation in order to implement their individual, expected variants. Using historical data and algorithms developed on its basis, the system is supposed to indicate the relevant forces and resources required, the methods and tactics for operations and characteristics of the security infrastructure. Moreover, the publication presents the fundamental mechanisms of the police command and control process during emergency situations and general remarks regarding the professional development of those who manage these types of policing operations. In the author’s opinion, of particular importance in this respect is the course addressed to commissioned police officers trained to be commanders or deputy commanders of security-related policing operations, where classes are conducted using a simulator for police operations in emergency situations. It is a form of advanced command staff training with the use of a virtual computer simulation system. The simulator makes it possible to develop algorithms for dealing with crisis incidents and to improve the command process during emergencies. One of the practical goals of developing the information and analysis system is its integration with the simulator for police operations in emergency situations. In this respect, it is supposed to be a tool used in multimedia decision-making training. The author comes to the conclusion that the expected functionalities of the information and analysis system will have a positive effect both on the educational process of improving professional qualifications of commanders of security-related policing operations and on the real planning, implementation and assessment of the operations themselves.
Źródło:
Internal Security; 2018, 10(1); 35-44
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prawne i kryminalistyczne aspekty zwalczania przestępstw korupcyjnych w ochronie pogranicza
Legal and forensic issues of combating corruption and providing borderland security
Autorzy:
Wielki, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/547230.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Opolski. Instytut Politologii
Tematy:
korupcja
pogranicze
prawo
kryminalistyka
analiza informacji
prewencja kryminalna
corruption
borderland
law
criminalistics
information analysis
crime prevention
Opis:
Problematyka zwalczania przestępstw korupcyjnych jest niezwykle zawiła i wciąż pozostaje aktualnym zagadnieniem nawet w państwach rozwiniętych. Sama korupcja na terenach przygranicznych jest ważnym zagadnieniem prawno-kryminalistycznym. Współczesne problemy migracyjne w Europie stanowią coraz większe wyzwanie dla organów ścigania, a determinacja ruchów migracyjnych może być szczególnie korupcjogenna. Problem jest niezmiernie istotny z uwagi na fakt, że Polska stanowi wschodnią granicą Schengen i Unii Europejskiej, dlatego właściwe działania służb policyjnych i specjalnych, nastawione na wykorzystanie możliwości analitycznych, mogą stanowić skuteczne narzędzie w zapewnieniu integralności granic. Mechanizmy uwzględnione w aktach normatywnych nie zawsze są wystarczająco skuteczne, jednakże z pomocą przychodzą nowe narzędzia kryminalistyczne.
The issue of combating corruption crimes is extremely hard and still actual, even in developed countries. Corruption in the border areas is an interesting issue for both legal and forensic research. Migration problems in Europe is a growing challenge for law enforcement, as the determination of migration may be particular to corruption. The problem is important due to the fact that Poland is the eastern border of the Schengen Area and the European Union, therefore, appropriate work of the police and special forces, focused on the use of analytical capabilities, can provide an effective tool in ensuring the integrity of the borders. Mechanisms included in the normative acts are not always effective, however, useful are new forensic tools.
Źródło:
Pogranicze. Polish Borderlands Studies; 2016, 4, 2; 231-243
2545-160X
2353-3781
Pojawia się w:
Pogranicze. Polish Borderlands Studies
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Information demand of foreign labor market from the point of view of Chinese students
Autorzy:
Pilarczyk, Anna
Naprawski, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/692575.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Ekonomiczny w Poznaniu
Tematy:
information-logistics engine
information demand analysis
information demand model
foreign labour market
demand-oriented management of information
Opis:
Today people are faced with a huge amount of information. Demand-oriented management of information can resolve this issue. Therefore, the measures that filter this information are the desired solution.  One of these measures is information demand analysis, which can be easily used for defining problems on the labour market, where the term of talent import is becoming increasingly important. The main contribution of this study is the analysis of the challenges facing the foreign labour market from the point of view of an employee and an employer and a proposal of an information demand model for strengthening the foreign labour market information system. The information demand model is one of the stages of the development of an information-logistics engine, which ensures that the right information is available in the right location, time and quality.
Źródło:
Research Papers in Economics and Finance; 2020, 4, 1; 31-35
2543-6430
Pojawia się w:
Research Papers in Economics and Finance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rola centrów wymiany i analizy informacji w budowaniu odporności kluczowych sektorów polskiej gospodarki
Autorzy:
Pawlik, Marek
Niewiadomska-Szynkiewicz, Ewa
Powiązania:
https://bibliotekanauki.pl/articles/13944698.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
key service operators
ISACs Information Sharing and Analysis Centers
Opis:
As the threats from cyberspace to IT systems (information technology) and digital OT systems (operational technologies) using ICT technologies (information and communication technologies) grow exponentially, while at the same time the scale of the use of digital data collecting, processing and sharing for the needs of many national economy areas and to support functioning of the state in terms of, for example, defence, health care, education or citizen services, building awareness of the risks and skills to secure networks, systems and digital services against cyber threats becomes crucial. A new type of structures called ISACs (Information Sharing and Analysis Centres) play an important role in this respect. The co-authors, based on the provisions of the law and their own experience in ISAC-Kolej and ISAC-GIG centers, present the ecosystem around ISAC centers, their tasks and challenges.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 23-39
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The use of Time-Driven Activity-Based Costing (TDABC) for calculating the costs of information processes
Autorzy:
Czerwiński, Adam
Powiązania:
https://bibliotekanauki.pl/articles/529771.pdf
Data publikacji:
2014
Wydawca:
Wyższa Szkoła Bankowa we Wrocławiu
Tematy:
Time-driven activity-based costing
TDABC, cost of information
cost of information process information process efficiency analysis
Opis:
The purpose of the paper is to present ways of applying Time-Driven Activity-Based Costing (TDABC) as an effective tool for evaluating the efficiency of information activities and processes. Measuring the costs of information and of information activities is difficult for a number of reasons. Therefore, information economics does not offer a separate concept or methodology for this type of costing. There is also a lack of suitable tools for assessing the value not only of information but also of information products. Time-driven activity-based costing may be used for measuring the costs of information processes. The paper demonstrates the above on the example of an "Request for Proposal (RFP) - offer" process that has been modelled as a network of activities. Then, time and labour resources required for the execution of the activities forming part of the process, as well as their drivers, have been identified. The above enabled to build time equations and cost formulas for the process. Using the above formulas, time and cost efficiency of the above information process for various customers were analysed. Then, it was possible to further study the impact of the cost structure of the labour resource on process efficiency.
Źródło:
Central and Eastern European Journal of Management and Economics (CEEJME); 2014, 2, 1; 43-54
2353-9119
Pojawia się w:
Central and Eastern European Journal of Management and Economics (CEEJME)
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mimicking speaker’s lip movement on a 3D head model using cosine function fitting
Autorzy:
Lüsi, I.
Anbarjafari, G.
Powiązania:
https://bibliotekanauki.pl/articles/199798.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
3D lip movement modelling
mathematical modelling
depth information analysis
cosine function fitting
human-computer interaction
modelowanie ruchu warg 3D
modelowanie matematyczne
funkcja cosinus
interakcja człowiek-komputer
Opis:
Real-time mimicking of human facial movement on a 3D head model is a challenge which has attracted attention of many researchers. In this research work we propose a new method for enhancing the capturing of the shape of lips. We present an automatic lip movement tracking method which employs a cosine function to interpolate between extracted lip features in order to make the detection more accurate. In order to test the proposed method, mimicking lip movements of a speaker on a 3D head model is studied. Microsoft Kinect II is used in order to capture videos and both RGB and depth information are used to locate the mouth of a speaker followed by fitting a cosine function in order to track the changes of the features extracted from the lips.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2017, 65, 5; 733-739
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Information literacy on the political agenda: An analysis of Estonian national strategic documents
Autorzy:
Merimaa, Kertti
Lepik, Krista
Powiązania:
https://bibliotekanauki.pl/articles/1112295.pdf
Data publikacji:
2020-05-08
Wydawca:
Polskie Towarzystwo Komunikacji Społecznej
Tematy:
information literacy
information society
policy
critical discourse analysis
qualitative text analysis
Estonia
Opis:
There is a controversy: while information literacy (IL) has been recognized to have a central role in operating efficiently in the information society, previous studies have noted that in the European political agenda, the actual wording of IL is rarely used. This study pays a close visit to 15 Estonian information policy–related national strategic documents from 1998 to 2014 to understand the emerging role of IL in these documents. Qualitative text analysis and critical discourse analysis are employed to analyse both explicit representations and implicit conceptualizations of IL, linked to social determinants, ideologies, and effects from the dominating discourse. Considering the different “faces” of IL (Bruce, 1997), one can see that while the dominant approach to IL is technologically oriented, few other concepts of IL can be detected. Discursively, the information society is defined through economic and technological fields, on the wave of technological determinism and neoliberalism, with some social equality.
Źródło:
Central European Journal of Communication; 2020, 13, 2(26); 183-201
1899-5101
Pojawia się w:
Central European Journal of Communication
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected Security Information Systems
Autorzy:
Truchan, Jarosław Radosław
Powiązania:
https://bibliotekanauki.pl/articles/1375146.pdf
Data publikacji:
2020
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
information systems
analysis
strategy
leadership
security
Opis:
At present, one of the main areas ensuring the proper functioning of services responsible for security is ICT systems, which are used to obtain, store and process relevant information and to support the performance of statutory tasks. When carrying out their statutory tasks, the Polish police use centralised, advanced IT systems and databases, e.g. the National Police Information System (hereinafter referred to as the KSIP). At the same time, the development of technology generates the need to constantly modify this line of activity. The necessity of being adaptable to the ever-changing environment has encouraged the Police Academy in Szczytno and its partners to launch the project entitled: Information and analysis system to support risk management when planning and carrying out police operations (hereinafter referred to as the SIA). Innovative in nature, the project is being implemented based on, among others, expert interviews conducted among police commanding officers. The SIA is being built using the data collected and stored in the police ICT systems and obtained from other sources. The works will result in the development of a possibly full application with planning and decision-making mechanisms and forecasting algorithms, which will provide information on probable successes and necessary investments in possible scenarios of police activities to be undertaken in a specific situation of massive disturbance to public order and safety. The proposed solution is the IT system that serves both as a presentation and simulation of possible incidents in the virtual environment. The author presents the functioning of selected modern ICT systems, and their role and importance in supporting decision-making processes when ensuring public order and safety.
Źródło:
Internal Security; 2020, 12(2); 201-215
2080-5268
Pojawia się w:
Internal Security
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Classification of text documents by using expanded terms in Latent Semantic Analysis
Klasyfikacja dokumentów tekstowych przy użyciu rozbudowanych wyrażeń w niejawnej analizie semantycznej
Autorzy:
Śmiałkowska, B.
Gibert, M.
Powiązania:
https://bibliotekanauki.pl/articles/951041.pdf
Data publikacji:
2013
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
text classification
information extraction
Latent Semantic Analysis
information retrieval
text representation
Opis:
In this article attention is paid to improving the quality of text document classification. The common techniques of analysis of text documents used in classification are shown and the weakness of these methods arc stressed. Discussed here is the integration of quantitative and qualitative methods, which is increasing the quality of classification. In the proposed approach the expanded terms, obtained by using information patterns are used in the Latent Semantic Analysis. Finally empirical research is presented and based upon the quality measures of the text document classification, the effectiveness of the proposed approach is proved.
W artykule skoncentrowano się na poprawie jakości klasyfikacji dokumentów tekstowych. Zostały przybliżone najpopularniejsze techniki analizy dokumentów tekstowych wykorzystywanych w klasyfikacji. Zwrócono uwagę na słabe strony opisanych technik. Omówiono możliwość integracji metod ilościowych i jakościowych analizy tekstu i jej wpływ na poprawę jakości klasyfikacji. Zaproponowano rozwiązanie, w którym rozbudowane wyrażenia otrzymane za pomocą wzorców informacyjnych są wykorzystywane w niejawnej analizie semantycznej. Ostatecznie w oparciu o miary jakości klasyfikacji dokumentów tekstowych zaprezentowano wyniki badań testowych, które potwierdzają skuteczność zaproponowanego rozwiązania.
Źródło:
Theoretical and Applied Informatics; 2013, 25, 3-4; 239-250
1896-5334
Pojawia się w:
Theoretical and Applied Informatics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Przestrzenno-czasowe zróżnicowanie stopnia wykorzystania technologii informacyjno- -telekomunikacyjnych w przedsiębiorstwach
Space – time differences in the use of information and communication technologies in enterprises
Autorzy:
Wojnar, Jolanta
Powiązania:
https://bibliotekanauki.pl/articles/549262.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Rzeszowski. Wydawnictwo Uniwersytetu Rzeszowskiego
Tematy:
Technologie Informacyjne miara syntetyczna analiza porównawcza metody porządkowania liniowego
Information Technology synthetic measure comparative analysis linear ordering methods
Opis:
W opracowaniu przedstawiono podobieństwa i różnice w skali wykorzystania technologii in-formacyjnych w przedsiębiorstwach w poszczególnych województwach w Polsce w latach 2008–2011. W pierwszym etapie analizy określono dynamikę zmian tego zjawiska na przestrzeni badanego okresu, aby ukazać dysproporcje pomiędzy regionami o najwyższej i najniższej skali badanego zjawiska. Kolejno za pomocą zmiennej syntetycznej dokonano uporządkowania województw i podziału na skupienia różniące się poziomem natężenia badanych cech w całym analizowanym okresie czasu. Dane służące do przeprowadzenia analiz zaczerpnięto z oficjalnych publikacji GUS (Bank Danych Regionalnych).
The paper presents similarities and differences of Polish provinces taking into account the development of information and communication technologies in companies. The basis for this analysis was selected data taken from national surveys carried out by the Central Statistical Office of Poland [GUS] from 2008 to 2011. The dynamics of this phenomenon over the period was analyzed to show the disparities between the regions with the highest and lowest scale of the phenomenon under study. The provinces were ranked using a synthetic variable.
Źródło:
Nierówności Społeczne a Wzrost Gospodarczy; 2013, 32; 494-504
1898-5084
2658-0780
Pojawia się w:
Nierówności Społeczne a Wzrost Gospodarczy
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Generalized formal model of big data
Autorzy:
Shakhovska, N.
Veres, O.
Hirnyak, M.
Powiązania:
https://bibliotekanauki.pl/articles/410946.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Oddział w Lublinie PAN
Tematy:
analysis
data
model
big data
information technology
Opis:
This article dwells on the basic characteristic features of the Big Data technologies. It is analyzed the existing definition of the "big data" term. The article proposes and describes the elements of the generalized formal model of big data. It is analyzed the peculiarities of the application of the proposed model components. It is described the fundamental differences between Big Data technology and business analytics. Big Data is supported by the distributed file system Google File System technology, Cassandra, HBase, Lustre and ZFS, by the MapReduce and Hadoop programming constructs and many other solutions. According to the experts, such as McKinsey Institute, the manufacturing, healthcare, trade, administration and control of individual movements undergo the transformations under the influence of the Big Data.
Źródło:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes; 2016, 5, 2; 33-38
2084-5715
Pojawia się w:
ECONTECHMOD : An International Quarterly Journal on Economics of Technology and Modelling Processes
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Normy, stardardy, modele i zalecenie w zarządzaniu bezpieczeństwem
NORMS, STANDARDS, MODELS AND RECOMMENDATIONS FOR INFORMATION SECURITY MANAGEMENT
Autorzy:
Kreft, Karol
Powiązania:
https://bibliotekanauki.pl/articles/419224.pdf
Data publikacji:
2010
Wydawca:
Uniwersytet Gdański. Wydział Ekonomiczny
Tematy:
information
security management systems
risk analysis
security models
Opis:
Information is the factor which can decide about the potential and market value of a company. An increase in the value of intellectual capital of an information-driven company requires development of an effective security management system. More and more often companies develop information security management systems (ISMS) based on already verified models. In the article, the main problems with management of information security were discussed. Security models were described, as well as the risk analysis in information security management.
Źródło:
Współczesna Gospodarka; 2010, 1, 1
2082-677X
Pojawia się w:
Współczesna Gospodarka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Role of Geospatial Technology in Crime Mapping: A Perspective View of India
Autorzy:
Ahmad, Ahmad
Uddin, Md Meraj
Goparaju, Laxmi
Powiązania:
https://bibliotekanauki.pl/articles/1178277.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Crime Analysis
Crime Mapping
Geographical Information Systems
India
Opis:
The advancement in computer science technology and development of GIS application softwares and the accessibility of various geographic data through open source data sources make it feasible for police and law enforcement departments to use it effectively.Crime mapping and spatial analysis using GIS tools such as hot spot generation, zonation, navigation, and crime profiling, mobile location identification and web based various application are well recognized and can be scientifically applied for betterment of citizens whereas it can be effectively used for prediction and control of crime. The present study analyzed the temporal crime data (Murder, dacoity, robbery, burglary, theft and riots) of India from the year 2001 to 2015 to understand the temporal trend whereas state wise crime data (IPC crime registered) from the year 2011 to 2015 was utilized to generate crime density map and percent change. We have also used the crime data for 10 citis (highest crime rate) of India including all metro cities for the year 2015 to understand city crime trend towards various crimes types. By analyzing the crime data of 2015 the study reveals that the crime density was in the range of 65.8 to 1140 the lowest in Nagaland whereas highest in Delhi which was found to be roughly 4.5 times than the national average. After the evaluation of crime percent change for the year 2015 with preceding year it was found that 29.6% largest increase in crime in Daman and Diu whereas Kerala and Delhi got second and third position with value 24.3% and 23% respectively. The evaluation of ten cities including the metro cities was done for the year 2015. The various city crime (total cognizable crime under IPC) per lakh population varies from 189.4 to 925.9 was found highest in the city Indore whereas it was found lowest in Chennai city. Murder, dacoity, robbery, burglary, theft, riots and other IPC crime per lakh population were found in the range of (0.9 to 11.3), (0 to 1.7), (0.6 to 31.1), (1.1 to 57.17), (14.8 to 445.6), (0.5 to 35.4) and (147.7 to 576.2) respectively. Patna city leads in Murder and dacoity. Indore leads in the crime like burglary and other IPC crime. Delhi city reported highest in robbery, theft whereas record was found lowest in riots.
Źródło:
World Scientific News; 2017, 88, 2; 211-226
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies