Results 81 to 90 of about 80,103 (295)
Semi-fragile Watermarking and Authentication for Law Enforcement Applications
In this paper, a semi-fragile watermarking method for authentication of law enforcement images such as digital images captured at crime scenes and traffic enforcement situations is proposed using the pinned sine transform (PST). The watermarking system can localize the portions of image that have been tampered maliciously, with high accuracy.
openaire +3 more sources
Encoding Cumulation to Learn Perturbative Nonlinear Oscillatory Dynamics
Weak nonlinearities critically shape the long term behavior of oscillatory systems but are difficult to identify from data. A data‐driven framework is introduced to infer governing equations of weakly nonlinear oscillators from sparse and noisy observations.
Teng Ma +5 more
wiley +1 more source
On Practical Issues of Electric Network Frequency Based Audio Forensics
The transmission frequency of power grids, i.e., electric network frequency (ENF), has become a common criterion to authenticate audio recordings during the past decade, drawing much attention from both the academic researchers and law enforcement ...
Guang Hua +2 more
doaj +1 more source
First Generation Proteolysis Targeting Chimeras (PROTACs) for the Treatment of Progeria
We report the first PROTACs designed to degrade progerin, introducing a novel therapeutic approach for progeria. The best compound, UCM‐18142, significantly reduces progerin levels and improves key disease phenotypes in patient‐derived cells and in the LmnaG609G/G609G mouse model, paving the way for new treatment strategies targeting the root cause of ...
Jon Macicior‐Michelena +5 more
wiley +1 more source
The existing automatic fingerprint verification methods are designed to work under the assumption that the same sensor is installed for enrollment and authentication (regular matching).
Helala Alshehri +5 more
doaj +1 more source
This study demonstrates that in high‐alloy systems, nanoclusters with high solute tolerance can effectively suppress compositional segregation. This mitigation leads to a concurrent 18.7% increase in strength and 41.5% improvement in ductility, which is attributed to a shear‐bypass synergistic strengthening mechanism. The findings provide a new pathway
Wei Yu +10 more
wiley +1 more source
The development of information technology has changed the method of proof in criminal law, especially regarding electronic evidence. In the Indonesian criminal justice system, electronic evidence is now recognized as a type of valid evidence, as ...
Sonia Ramadani +2 more
doaj +1 more source
Authentic bank accounting data in evidence according to Palestinian law
Many disputes occur between the bank and customers as a result of the implementation of the contracts that bind them. So the bank presents its accounting data as evidence to prove its right or pleaded customer’s claim of his rights. The main subject of the research e is the extent of authenticity of these data, which the bank made.
openaire +1 more source
This study investigates how CTCs survive varying shear stress during hematogenous metastasis. We uncover a self‐protection mechanism, by which non‐adherent CTCs adapt to high shearing milieu through accumulated cytoplasmic myosin‐mediated disruption of myosin‐actin binding, attenuating force transmission into chromatin to protect CTCs from shear ...
Cunyu Zhang +10 more
wiley +1 more source
Security and computer forensics in web engineering education [PDF]
The integration of security and forensics into Web Engineering curricula is imperative! Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually.
Glisson, L.M., Glisson, W., Welland, R.
core

