Search results for "Exploit"

showing 10 items of 284 documents

Il delitto di "caporalato" tra diritti minimi della persona e tutela del mercato del lavoro

2020

Il contributo analizza il reato di intermediazione illecita e sfruttamento lavorativo, offrendo un’analisi comparata con il sistema repressivo tedesco. Lo studio si sofferma, in particolare, sui limiti di legittimazione del diritto penale nella punizione dei fatti di “caporalato”, nel tentativo di scongiurare che l’intervento repressivo nelle dinamiche economiche e contrattuali, di natura sinallagmatica, possa assumere una portata tale da porsi in contrasto con il canone della sussidiarietà. A tal fine, si suggerisce una prospettiva ermeneutica che incentri il disvalore penale del reato di cui all’art. 603-bis c.p. sulla lesione dei diritti fondamentali del lavoratore – riconducibili agli a…

Settore IUS/17 - Diritto PenaleThe paper analyses the offence of unlawful work intermediation and exploitation offering a comparative analysis with the German punitive system. The study focuses in particular on the limits of legitimacy of criminal law in the punishment of gangmaster acts in the attempt to avoid that the punitive intervention in economic and contractual dynamics of a mutual nature could be so intrusive to be in contrast with the principle of subsidiarity. To this end the author suggests an interpretative perspective that centres the penal disvalue of the offence under article 603-bis of the criminal code on the harm to fundamental workers’ rights – as linked to articles 4 35 and 36 of the Italian Constitutions – which work as a limit to entrepreneurial freedom. To be sure the indexes of exploitation listed by the criminalising norm seem to echo those fundamental human rights attributed to a person as a worker: those very same rights that – when harmed in their minimal and therefore intangible dimension – legitimise the intervention of the ius terribile. The article also stresses the protection of the job market: in this sense the offence – even if situated within the Kernstrafrecht – represents a new paradigm of the institutional response within the framework of the contemporary relationships between law and economics.
researchProduct

Vulnerability to Forced Labour and Trafficking: The case of Romanian women in the agricultural sector in Sicily

2015

This paper focuses on labour and sexual exploitation faced by Romanian female workers employed in the agricultural sector in Ragusa, Sicily, Italy. Drawing on fieldwork conducted in 2013 and 2014 with Romanian female farm workers in Ragusa, the paper identifies factors that contribute towards their vulnerability to exploitation. By paying specific attention to the experiences of women who are mothers with dependent children, we look at structural factors that increase their vulnerability and consider how this vulnerability ‘forces’ women into situations whereby they effectively accept and/or submit to abuse. We also highlight how European Union (EU) citizenship does not automatically protec…

Settore IUS/20 - Filosofia Del DirittoEconomic growthSettore SPS/08 - Sociologia Dei Processi Culturali E Comunicativimedia_common.quotation_subjectDeclarationPsychological interventionDevelopment economicsmedia_common.cataloged_instanceEuropean unionCitizenshipmedia_commonlabour exploitation sexual exploitation European Union citizen migrants female migrants farm workers human trafficking forced labour vulnerability Italy Romaniabusiness.industrySettore IUS/14 - Diritto Dell'Unione EuropeaRomanianlcsh:LawDirectivelanguage.human_languageGeographyAgriculturePolitical Science and International RelationslanguageNorm (social)businessLawlcsh:KAnti-Trafficking Review
researchProduct

The vulnerability of Nigerian and Romanian women in sexual exploitation. Motherhood as being a double vulnerability.

2018

Settore IUS/20 - Filosofia Del DirittoNigerianhuman traffickingsexual exploitationmotherhoodVulnerabilitySettore SPS/07 - Sociologia GeneraleRomanian
researchProduct

The Slave Coasts. Transnational Sexual Exploitation from Nigeria to Italy. From human trafficking to human rights

2019

This research intends to open a global debate on the current strong link between migration and prostitution on the basis of the reality observed in Palermo in the timespan 2015-2017. The main three elements emerging from the analysis are criminality, poverty and exploitation. As data suggests, Italy is the favorite destination of the Nigerian sexual exploitation market. In particular, Sicily plays a major role in the sexual exploitation ring involving Nigerian migrants, besides headquartering the Italian as well the Nigerian mafia. The agreement between Cosa Nostra (Sicilian Mafia) and the two organizations known as Black Axe and Eye (Nigerian mafia) represents the starting point for sexual…

Settore IUS/20 - Filosofia Del Dirittohuman trafficking prostitution migration women's rights gender equality sexual exploitation Swedish model mafia Black Axe Palermo Protocol
researchProduct

Schiavitù, servitù e sfruttamento lavorativo

2022

La pronuncia in commento individua il limite discretivo tra gli artt. 600 e 603-bis c.p. nella mancanza di alternative esistenziali, quale contenuto della situazione di vulnerabilità richiesta dalla fattispecie di riduzione o mantenimento in schiavitù o servitù ex art. 600 c.p. L’art. 603-bis c.p. configurerebbe, invece, un’area nella quale la condotta del datore di lavoro non determina una compressione altrettanto rilevante della libertà di autodeterminazione del lavoratore, ma che, allo stesso tempo, non possa neppure essere liquidata come una violazione meramente formale della normativa giuslavoristica.

Slavery vulnerability exploitationSettore IUS/07 - Diritto Del LavoroSettore IUS/17 - Diritto Penale
researchProduct

Smart Assistance for Students and People Living in a Campus

2019

Being part of one of the fastest growing area in Artificial Intelligence (AI), virtual assistants are nowadays part of everyone's life being integrated in almost every smart device. Alexa, Siri, Google Assistant, and Cortana are just few examples of the most famous ones. Beyond these off-the-shelf solutions, different technologies which allow to create custom assistants are available. IBM Watson, for instance, is one of the most widely-adopted question-answering framework both because of its simplicity and accessibility through public APIs. In this work, we present a virtual assistant that exploits the Watson technology to support students and staff of a smart campus at the University of Pa…

Smart service systemMultimediaExploitWatsonComputer sciencemedia_common.quotation_subjectSmart device02 engineering and technologycomputer.software_genreRemote assistanceVirtual Assistantlaw.inventionWork (electrical)lawSmart Campu020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSimplicitySmart campuscomputerIbm watsonmedia_common2019 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

First Experiences on an Accurate SPH Method on GPUs

2017

It is well known that the standard formulation of the Smoothed Particle Hydrodynamics is usually poor when scattered data distribution is considered or when the approximation near the boundary occurs. Moreover, the method is computational demanding when a high number of data sites and evaluation points are employed. In this paper an enhanced version of the method is proposed improving the accuracy and the efficiency by using a HPC environment. Our implementation exploits the processing power of GPUs for the basic computational kernel resolution. The performance gain demonstrates the method to be accurate and suitable to deal with large sets of data.

SpeedupExploitGPUsComputer scienceComputer Networks and CommunicationsGPUSmoothed Particle Hydrodynamics method010103 numerical & computational mathematics01 natural sciencesComputational scienceSmoothed-particle hydrodynamicsInstruction setSettore MAT/08 - Analisi NumericaArtificial IntelligenceAccuracy; Approximation; GPUs; Kernel function; Smoothed particle hydrodynamics method; Speed-Up; Artificial Intelligence; Computer Networks and Communications; 1707; Signal Processing0101 mathematicsApproximationAccuracy1707Random access memoryLinear systemKernel functionSpeed-Up010101 applied mathematicsKernel (statistics)Signal Processing
researchProduct

Incorporating big microdata in life table construction: A hypothesis-free estimator

2019

Abstract The IT revolution, now more than ever, offers a cheaper and faster way to collect, store, transmit and process data. Detailed microdata of dates of death, migration and birth are already becoming available for general populations. In this paper, we develop within the family of period-based estimators a new, assumption-free estimator for constructing life tables. The estimator proposed exploits all the detailed data available and is free of the theoretical inconsistencies that the estimators currently used by most official statistical agencies have. We compute the proposed estimator for a real database and test the suitability of the hypotheses on which the estimators used so far re…

Statistics and ProbabilityEconomics and Econometrics050208 financeExploitbusiness.industryComputer science05 social sciencesBig dataMicrodata (statistics)EstimatorDetailed data01 natural sciences010104 statistics & probabilityLife insurance0502 economics and businessPublic pensionEconometrics0101 mathematicsStatistics Probability and UncertaintybusinessInsurance: Mathematics and Economics
researchProduct

A Knowledge Management and Decision Support Model for Enterprises

2011

We propose a novel knowledge management system (KMS) for enterprises. Our system exploits two different approaches for knowledge representation and reasoning: a document-based approach based on data-driven creation of a semantic space and an ontology-based model. Furthermore, we provide an expert system capable of supporting the enterprise decisional processes and a semantic engine which performs intelligent search on the enterprise knowledge bases. The decision support process exploits the Bayesian networks model to improve business planning process when performed under uncertainty. Copyright © 2011 Patrizia Ribino et al.

Statistics and ProbabilityKnowledge Management SystemsSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniDecision support systemKnowledge managementArticle SubjectKnowledge representation and reasoningExploitProcess (engineering)business.industryComputer sciencelcsh:MathematicsApplied MathematicsGeneral Decision SciencesBayesian networkOntology (information science)lcsh:QA1-939computer.software_genreExpert systemComputational MathematicsKnowledge-based systemsbusinesscomputer
researchProduct

Bayesian design in queues: An application to aeronautic maintenance

2007

We exploit Bayesian criteria for designing M/M/c//r queueing systems with spares. For illustration of our approach we use a real problem from aeronautic maintenance, where the numbers of repair crews and spare planes must be sufficiently large to meet the necessary operational capacity. Bayesian guarantees for this to happen can be given using predictive or posterior distributions.

Statistics and ProbabilityQueueing theoryMathematical optimizationExploitOperations researchApplied MathematicsBayesian probabilityPosterior probabilityComputerApplications_COMPUTERSINOTHERSYSTEMSProbability and statisticsBayesian designSpare partStatistics Probability and UncertaintyQueueMathematicsJournal of Statistical Planning and Inference
researchProduct