Results 61 to 70 of about 66,758 (286)

Image Structure-Induced Semantic Pyramid Network for Inpainting

open access: yesApplied Sciences, 2023
The existing deep-learning-based image inpainting algorithms often suffer from local structure disconnections and blurring when dealing with large irregular defective images.
Rong Huang, Yuhui Zheng
doaj   +1 more source

A framework for the forensic investigation of unstructured email relationship data [PDF]

open access: yes, 2011
Our continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data.
Haggerty, J   +3 more
core   +1 more source

Differences in Immediate and Delayed Suggestibility Among Children With Dyslexia and Controls

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT The primary aim of this study was to investigate the relationship between dyslexia and suggestibility in children, and the extent to which this relationship is accounted for by performance on Word Tasks. Participants comprised 95 children with dyslexia and 109 controls.
Gisli Gudjonsson   +2 more
wiley   +1 more source

StrokeNeXt: an automated stroke classification model using computed tomography and magnetic resonance images

open access: yesBMC Medical Imaging
Background and Objective Stroke ranks among the leading causes of disability and death worldwide. Timely detection can reduce its impact. Machine learning delivers powerful tools for image‑based diagnosis.
Evren Ekingen   +7 more
doaj   +1 more source

Using a Goal-Driven Approach in the Investigation of a Questioned Contract [PDF]

open access: yes, 2013
Part 3: FORENSIC TECHNIQUESInternational audienceThis paper presents a systematic process for describing digital forensic investigations. It focuses on forensic goals and anti-forensic obstacles and their operationalization in terms of human and software
Aziz, Benjamin, Blackwell, C., Islam, S.
core   +3 more sources

A Latent Transition Analysis of Traditional Bullying and Cyberbullying Among Chinese Adolescents: Associations With Life Satisfaction and Depression

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT Bullying, both traditional and cyber, has become a public health concern. Nevertheless, few studies have differentiated between traditional bullying and cyberbullying to examine how their interplay shapes distinct bullying involvement profiles and how these profiles link with well‐being and mental health outcomes.
Xingzhou Zhang   +3 more
wiley   +1 more source

Blockchain enhanced smart healthcare management for chronic diseases

open access: yesDiscover Computing
Chronic diseases affect millions of people worldwide, making it a significant issue for the efficient and secure management of patient data. Most traditional chronic disease management systems fail to manage data in real time and struggle with ...
Shruti Saxena   +3 more
doaj   +1 more source

Investigating visualisation techniques for rapid triage of digital forensic evidence [PDF]

open access: yes, 2019
This study investigates the feasibility of a tool that allows digital forensics (DF) investigators to efficiently triage device datasets during the collection phase of an investigation.
Bayne, Ethan, Hales, Gavin
core   +2 more sources

The Tree of Life Synagogue Attack: A Terrorist Radicalization Assessment Protocol‐18 Examination of Pre‐Attack Warnings and Post‐Attack Contagion and Copycat Effects

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT This is a retrospective case study of an antisemitic lone actor terrorist who completed the deadliest attack against the Jewish community in American history. The analysis through the lens of the Terrorist Radicalization Assessment Protocol (TRAP‐18) finds that 72% of the warning indicators were present, including four proximal warning ...
Molly Amman, Julia Kupper, J. Reid Meloy
wiley   +1 more source

Unveiling the Dynamic Landscape of Digital Forensics: The Endless Pursuit

open access: yesComputers
The invention of transistors in the 1940s marked the beginning of a technological revolution that has impacted every aspect of our lives. However, along with the positive advancements, the malicious use of computing technologies has become a serious ...
Muhammad Sharjeel Zareen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy