Results 41 to 50 of about 66,060 (274)

Edge-based AI solution for enhancing urban safety: helmet compliance monitoring with YOLOv9 on Raspberry Pi

open access: yesDiscover Internet of Things
This paper presents an automated helmet detection system leveraging Raspberry Pi and advanced deep learning techniques, specifically the YOLOv9 object detection model that focuses on real-time object detection.
Nikunj Tahilramani   +4 more
doaj   +1 more source

A survey on digital forensics trends [PDF]

open access: yes, 2014
Digital forensic has evolved from addressing minor computer crimes to investigation of complex international cases with massive effect on the world.
Damshenas, Mohsen   +2 more
core   +2 more sources

Anxiety and Aggression Among College Students With High‐Risk Adverse Childhood Experiences: The Role of Bullying Perpetration

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT This study examines the potential associations between anxiety and aggressive behaviors in college students with high‐risk adverse childhood experiences (ACEs) and explores how this relationship may be influenced by bullying perpetration, applying general strain theory. A sample of 282 college students aged 19 to 29 (Mage = 21.59, SDage = 2.48;
Jeoung Min Lee   +5 more
wiley   +1 more source

Digital Forensics

open access: yesAmerican Scientist, 2013
A reprint from American Scientist the magazine of Sigma Xi, The Scientific Research Society Since the 1980s, computers have had increasing roles in all aspects of human life—including an involvement in criminal acts. This development has led to the rise of digital forensics, the uncovering and examination of evidence located on all things electronic ...
openaire   +4 more sources

An explainable EEG epilepsy detection model using friend pattern

open access: yesScientific Reports
The electroencephalography (EEG) signals are very important for obtaining information from the brain, and EEG signals are one of the cheapest methods to gather information from the brain. EEG signals have commonly been used to detect epilepsy. Therefore,
Turker Tuncer, Sengul Dogan
doaj   +1 more source

Use of computer forensics in the digital curation of removable media [PDF]

open access: yes, 2009
The purpose of this paper is to encourage the discussion of the potential place and value of digital forensics techniques when dealing with acquisitions on removable media in the field of digital curation.
Glisson, W.B.
core  

Can ISO/IEC 17025 serve as a tool to prevent scientific fraud in chemical research laboratories?

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Abstract Scientific fraud has been documented across multiple disciplines, and chemistry is no exception. Recent studies indicate that contamination of materials, methodological errors, and unreliable data, results, or analyses account for over 25% of retracted publications.
Flor Monica Gutierrez‐Alcantara
wiley   +1 more source

The Forensics Aspects of Event Data Recorders

open access: yesJournal of Digital Forensics, Security and Law, 2008
The proper generation and preservation of digital data from Event Data Recorders (EDRs) can provide invaluable evidence to automobile crash reconstruction investigations.
Jeremy S. Daily   +3 more
doaj  

Cybersecurity and Forensic Analysis of IP-Cameras Used in Saudi Arabia

open access: yesJournal of Information Security and Cybercrimes Research
In smart city infrastructure, IP cameras play a pivotal role in crime prevention and detection. However, not much research has been conducted on IP cameras from a cybersecurity and forensics perspective.
Istabraq M. Alshenaif   +3 more
doaj   +1 more source

A framework for the forensic investigation of unstructured email relationship data [PDF]

open access: yes, 2011
Our continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data.
Haggerty, J   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy