Results 81 to 90 of about 80,103 (295)

Semi-fragile Watermarking and Authentication for Law Enforcement Applications

open access: yesSecond International Conference on Innovative Computing, Informatio and Control (ICICIC 2007), 2007
In this paper, a semi-fragile watermarking method for authentication of law enforcement images such as digital images captured at crime scenes and traffic enforcement situations is proposed using the pinned sine transform (PST). The watermarking system can localize the portions of image that have been tampered maliciously, with high accuracy.
openaire   +3 more sources

Encoding Cumulation to Learn Perturbative Nonlinear Oscillatory Dynamics

open access: yesAdvanced Science, EarlyView.
Weak nonlinearities critically shape the long term behavior of oscillatory systems but are difficult to identify from data. A data‐driven framework is introduced to infer governing equations of weakly nonlinear oscillators from sparse and noisy observations.
Teng Ma   +5 more
wiley   +1 more source

On Practical Issues of Electric Network Frequency Based Audio Forensics

open access: yesIEEE Access, 2017
The transmission frequency of power grids, i.e., electric network frequency (ENF), has become a common criterion to authenticate audio recordings during the past decade, drawing much attention from both the academic researchers and law enforcement ...
Guang Hua   +2 more
doaj   +1 more source

First Generation Proteolysis Targeting Chimeras (PROTACs) for the Treatment of Progeria

open access: yesAdvanced Science, EarlyView.
We report the first PROTACs designed to degrade progerin, introducing a novel therapeutic approach for progeria. The best compound, UCM‐18142, significantly reduces progerin levels and improves key disease phenotypes in patient‐derived cells and in the LmnaG609G/G609G mouse model, paving the way for new treatment strategies targeting the root cause of ...
Jon Macicior‐Michelena   +5 more
wiley   +1 more source

Alignment-Free Cross-Sensor Fingerprint Matching Based on the Co-Occurrence of Ridge Orientations and Gabor-HoG Descriptor

open access: yesIEEE Access, 2019
The existing automatic fingerprint verification methods are designed to work under the assumption that the same sensor is installed for enrollment and authentication (regular matching).
Helala Alshehri   +5 more
doaj   +1 more source

Cluster‐Mediated Solute Stabilization and Shear‐Bypass Synergistic Strengthening in High‐Alloyed Systems

open access: yesAdvanced Science, EarlyView.
This study demonstrates that in high‐alloy systems, nanoclusters with high solute tolerance can effectively suppress compositional segregation. This mitigation leads to a concurrent 18.7% increase in strength and 41.5% improvement in ductility, which is attributed to a shear‐bypass synergistic strengthening mechanism. The findings provide a new pathway
Wei Yu   +10 more
wiley   +1 more source

THE EVIDENTIARY POWER OF ELECTRONIC DOCUMENTS AS AN EXTENSION OF LEGAL EVIDENCE ACCORDING TO ELECTRONIC INFORMATION AND TRANSACTIONS LAW (UU ITE)

open access: yesAsy Syar'iyyah: Jurnal Ilmu Syariah dan Perbankan Islam
The development of information technology has changed the method of proof in criminal law, especially regarding electronic evidence. In the Indonesian criminal justice system, electronic evidence is now recognized as a type of valid evidence, as ...
Sonia Ramadani   +2 more
doaj   +1 more source

Authentic bank accounting data in evidence according to Palestinian law

open access: yesAn-Najah University Journal for Research - B (Humanities), 2023
Many disputes occur between the bank and customers as a result of the implementation of the contracts that bind them. So the bank presents its accounting data as evidence to prove its right or pleaded customer’s claim of his rights. The main subject of the research e is the extent of authenticity of these data, which the bank made.
openaire   +1 more source

Mechanoadaptation via Myosin Cytoplasmic Redistribution Protects Circulating Tumor Cells From Shear‐induced Death During Hematogenous Dissemination

open access: yesAdvanced Science, EarlyView.
This study investigates how CTCs survive varying shear stress during hematogenous metastasis. We uncover a self‐protection mechanism, by which non‐adherent CTCs adapt to high shearing milieu through accumulated cytoplasmic myosin‐mediated disruption of myosin‐actin binding, attenuating force transmission into chromatin to protect CTCs from shear ...
Cunyu Zhang   +10 more
wiley   +1 more source

Security and computer forensics in web engineering education [PDF]

open access: yes, 2010
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core  

Home - About - Disclaimer - Privacy