Results 1 to 10 of about 66,060 (274)

FF-BTP Model for Novel Sound-Based Community Emotion Detection

open access: yesIEEE Access, 2023
Most emotion classification schemes to date have concentrated on individual inputs rather than crowd-level signals. In addressing this gap, we introduce Sound-based Community Emotion Recognition (SCED) as a fresh challenge in the machine learning domain.
Arif Metehan Yildiz   +8 more
doaj   +1 more source

Aspects of Digital Forensics in South Africa [PDF]

open access: yes, 2016
This paper explores the issues facing digital forensics in South Africa. It examines particular cyber threats and cyber threat levels for South Africa and the challenges in addressing the cybercrimes in the country through digital forensics.
Irons, Alastair, Ophoff, Jacques
core   +2 more sources

Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment

open access: yesEAI Endorsed Transactions on Creative Technologies, 2022
Digital forensics deals with digital evidence. Digital forensics is the study of data detection, acquisition, processing, analysis, and reporting. Encouraging the use of digital forensics in law enforcement investigations.
Muhammad Shoaib Akhtar, Tao Feng
doaj   +1 more source

Determining the effective number and surfaces of teeth for forensic dental identification through the 3D point cloud data analysis

open access: yesEgyptian Journal of Forensic Sciences, 2020
Background The assimilation between three-dimensional (3D) imaging techniques and dental forensic science can provide rich and stable information for human identification.
Arofi Kurniawan   +6 more
doaj   +1 more source

Digital forensics formats: seeking a digital preservation storage format for web archiving [PDF]

open access: yes, 2011
In this paper we discuss archival storage formats from the point of view of digital curation and preservation. Considering established approaches to data management as our jumping off point, we selected seven format attributes which are core to the ...
Kim, Y., Ross, S.
core   +4 more sources

An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing

open access: yesIEEE Access, 2020
With the rapid growth of the number of images, many content-based image retrieval methods have been extensively used in our daily life. In general, image retrieval services are very expensive in terms of computing and storage.
Hua Wang   +3 more
doaj   +1 more source

Voice Activity Detection Optimized by Adaptive Attention Span Transformer

open access: yesIEEE Access, 2023
Voice Activity Detection (VAD) is a widely used technique for separating vocal regions from audio signals, with applications in voice language coding, noise reduction, and other domains.
Wenpeng Mu, Bingshan Liu
doaj   +1 more source

Comparative analysis of digital artifact persistence between file format [PDF]

open access: yes, 2017
As we know digital forensics is a scientific examination and analysis of data that when it held on, or where it is retrieved from so that the information collected can be used as evidence in a court of law.
Mohamad, Kamaruddin Malik   +1 more
core   +1 more source

Mobile forensic triage for damaged phones using M_Triage [PDF]

open access: yes, 2016
Mobile forensics triage is a useful technique in a digital forensics investigation for recovering lost or purposely deleted and hidden files from digital storage.
Mohammed Hasheem, Yusoof
core   +1 more source

CubicPat: Investigations on the Mental Performance and Stress Detection Using EEG Signals

open access: yesDiagnostics
Background\Objectives: Solving the secrets of the brain is a significant challenge for researchers. This work aims to contribute to this area by presenting a new explainable feature engineering (XFE) architecture designed to obtain explainable results ...
Ugur Ince   +9 more
doaj   +1 more source

Home - About - Disclaimer - Privacy