Results 51 to 60 of about 2,970,764 (321)

Color-decoupled photo response non-uniformity for digital image forensics [PDF]

open access: yes, 2012
The last few years have seen the use of photo response non-uniformity noise (PRNU), a unique fingerprint of imaging sensors, in various digital forensic applications such as source device identification, content integrity verification and authentication.
Li, Chang-Tsun, Li, Yue
core   +2 more sources

ForensicTransMonitor: A Comprehensive Blockchain Approach to Reinvent Digital Forensics and Evidence Management

open access: yesInf.
In the domain of computer forensics, ensuring the integrity of operations like preservation, acquisition, analysis, and documentation is critical. Discrepancies in these processes can compromise evidence and lead to potential miscarriages of justice.
Saad Said Alqahtany, Toqeer Ali Syed
semanticscholar   +1 more source

A Degradable Bioinspired Flier with Aerogel‐Based Colorimetric Sensors for Environmental Monitoring

open access: yesAdvanced Science, EarlyView.
Biodegradable fliers are developed inspired by Tipuana tipu samaras, integrating cellulose nanocrystal aerogel (CNCa) sensors loaded with natural dyes for pH and ammonia detection. The lightweight, degradable fliers mimic natural morphology and aerodynamics, offering an eco‐friendly, scalable solution for in situ environmental monitoring after passive ...
Gianpaolo Gallo   +4 more
wiley   +1 more source

Edge-based AI solution for enhancing urban safety: helmet compliance monitoring with YOLOv9 on Raspberry Pi

open access: yesDiscover Internet of Things
This paper presents an automated helmet detection system leveraging Raspberry Pi and advanced deep learning techniques, specifically the YOLOv9 object detection model that focuses on real-time object detection.
Nikunj Tahilramani   +4 more
doaj   +1 more source

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications

open access: yesIEEE Access, 2018
Both Android application developers and malware authors use sophisticated obfuscation tools to prevent their mobile applications from being repackaged and analyzed.
Haehyun Cho   +2 more
doaj   +1 more source

A framework for the forensic investigation of unstructured email relationship data [PDF]

open access: yes, 2011
Our continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data.
Haggerty, J   +3 more
core   +1 more source

Hungry for Knowledge: Octopamine Signaling Regulates Hunger‐Enhanced Olfactory Learning

open access: yesAdvanced Science, EarlyView.
Researchers demonstrate that hunger state facilitates both aversive and appetitive olfactory learning. Two distinct octopamine signaling pathways are involved in aversive or appetitive memory formation in the hunger state. And, hunger state also facilitates the formation of both types of memories via an evolutionarily conserved norepinephrine (the ...
Huijuan Zhao   +14 more
wiley   +1 more source

Digital Forensics

open access: yesAmerican Scientist, 2013
A reprint from American Scientist the magazine of Sigma Xi, The Scientific Research Society Since the 1980s, computers have had increasing roles in all aspects of human life—including an involvement in criminal acts. This development has led to the rise of digital forensics, the uncovering and examination of evidence located on all things electronic ...
openaire   +4 more sources

An explainable EEG epilepsy detection model using friend pattern

open access: yesScientific Reports
The electroencephalography (EEG) signals are very important for obtaining information from the brain, and EEG signals are one of the cheapest methods to gather information from the brain. EEG signals have commonly been used to detect epilepsy. Therefore,
Turker Tuncer, Sengul Dogan
doaj   +1 more source

Learnable Nonlocal Contrastive Network for Single Image Super-Resolution

open access: yesApplied Sciences, 2023
Single image super-resolution (SISR) aims to recover a high-resolution image from a single low-resolution image. In recent years, SISR methods based on deep convolutional neural networks have achieved remarkable success, and some methods further improve ...
Binbin Xu, Yuhui Zheng
doaj   +1 more source

Home - About - Disclaimer - Privacy