Results 1 to 10 of about 18,818,002 (323)

Rural policing in China: Criminal investigation and policing resources for police officers. [PDF]

open access: yesHeliyon, 2023
This study examines the state of policing resources in rural areas of central China and investigates how police officers conduct criminal investigations.
Keke P   +5 more
europepmc   +4 more sources

A comprehensive review of gait analysis using deep learning approaches in criminal investigation. [PDF]

open access: yesPeerJ Comput Sci
Despite the growing worries expressed by privacy supporters about the extensive adoption of gait biometrics, research in this field has been moving forward swiftly. Deep learning, a powerful technology that enables computers to learn from data, has found
Aung STY, Kusakunniran W.
europepmc   +2 more sources

Genealogy databases and the future of criminal investigation. [PDF]

open access: yesScience, 2018
The police can access your online family-tree research—and use it to investigate your relatives The 24 April 2018 arrest of Joseph James DeAngelo as the alleged Golden State Killer, suspected of more than a dozen murders and 50 rapes in California, has ...
Ram N, Guerrini CJ, McGuire AL.
europepmc   +2 more sources

Use-inspired basic research on individual differences in face identification: implications for criminal investigation and security. [PDF]

open access: yesCogn Res Princ Implic, 2018
This journal is dedicated to “use-inspired basic research” where a problem in the world shapes the hypotheses for study in the laboratory. This review considers the role of individual variation in face identification and the challenges and opportunities ...
Lander K, Bruce V, Bindemann M.
europepmc   +2 more sources

Framing in criminal investigation: How police officers (re)construct a crime. [PDF]

open access: yesPolice J, 2017
Failures in criminal investigation may lead to wrongful convictions. Insight in the criminal investigation process is needed to understand how these investigative failures may rise and how measures can contribute to the prevention of this kind of ...
Salet R.
europepmc   +2 more sources

A score based likelihood ratio framework for deepfake image identification in forensic science [PDF]

open access: yesScientific Reports
This paper proposes a score-based likelihood ratio system for forensic identification of deepfake images, addressing challenges in digital media identification due to rapid deepfake development. Built on the FaceForensics + + dataset, the system prevents
Tianli Guo, Jisong Li, Yunqi Tang
doaj   +2 more sources

The socio-economic status of adult female perpetrators of criminal offences in the Republic of Serbia [PDF]

open access: yesNBP: Nauka, bezbednost, policija, 2023
The subject of this paper is the research of socioeconomic status of adult female perpetrators of criminal offences in the Republic of Serbia. For this purpose, the following characteristics of adult women perpetrators have been observed: age, marital ...
Radović-Stojanović Jelena   +2 more
doaj   +1 more source

Risk assessment of flying through a zone with increased radioactive radiation [PDF]

open access: yesNuclear Technology and Radiation Protection, 2023
This research deals with the assessment of the risk to which air traffic is exposed in zones of increased level of radioactive radiation. Natural disasters and war conflicts, which take place around nuclear power plants and the radioactive area (
Ivković Aleksandar S.   +3 more
doaj   +1 more source

Health care of convicts in penal institutions in the Principality and the Kingdom of Serbia [PDF]

open access: yesVojnosanitetski Pregled, 2021
nema
Knežević-Lukić Nevenka   +2 more
doaj   +1 more source

Graph embeddings in criminal investigation: towards combining precision, generalization and transparency

open access: yesWorld wide web (Bussum), 2022
Criminal investigation adopts Artificial Intelligence to enhance the volume of the facts that can be investigated and documented in trials. However, the abstract reasoning implied in legal justification and argumentation requests to adopt solutions ...
V. Bellandi   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy