Results 1 to 10 of about 157,105 (298)

Proteomic and Metabolomic Analyses of Maggots in Porcine Corpses for Post-Mortem Interval Estimation

open access: yesApplied Sciences, 2021
Post-mortem interval (PMI) estimation is a critical task in forensic science. In this study, we used maggots collected from pig carcasses and applied an integrated proteomics and metabolomics approach to determine potential candidate substances for the ...
Jeong-Hun Mok   +8 more
doaj   +1 more source

Confimizer: A Novel Algorithm to Optimize Cloud Resource by Confidentiality-Cost Trade-Off Using BiLSTM Network

open access: yesIEEE Access, 2023
The world is expiring a 23% annual data growth rate and is projected to have a total surplus volume of 175 Zettabytes by 2025. It imposes significant challenges for small to medium-sized businesses to allocate funds for large-size data storage ...
Sandesh Achar   +3 more
doaj   +1 more source

Advances͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ in͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ the͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ Applications͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ of͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ Organic͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ Materials͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ for͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ Fingerprint͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ Detection [PDF]

open access: yesمجلة جامعة الانبار للعلوم الصرفة, 2023
One͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ of͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ the͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ most͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ significant͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ parts͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ of͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ physical͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ evidence͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ at͏ ͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏͏ a͏͏͏͏
Mohammed Al-Mashhadani   +4 more
doaj   +1 more source

DNA fingerprints from fingerprints [PDF]

open access: yesNature, 1997
Forensic scientists regularly generate genetic profiles from old blood stains, seminal stains, vaginal swabs, hair, bone, urine and cigarette butts1,2,3,4,5,6. We show that an individual's genetic profile can now also be generated from swabs taken from objects touched by hands, providing a new tool for crime scene investigations.
R A, van Oorschot, M K, Jones
openaire   +2 more sources

Quantum Fingerprinting [PDF]

open access: yesPhysical Review Letters, 2001
Physical Review ...
Buhrman, H.M.   +3 more
openaire   +4 more sources

Anomaly Detection Method for Unknown Protocols in a Power Plant ICS Network with Decision Tree

open access: yesApplied Sciences, 2023
This study aimed to enhance the stability and security of power plant control network systems by developing detectable models using artificial intelligence machine learning techniques.
Kyoung-Mun Lee   +3 more
doaj   +1 more source

The Impact of Pressure on the Fingerprint Impression: Presentation Attack Detection Scheme

open access: yesApplied Sciences, 2021
Fingerprint recognition systems have been widely deployed in authentication and verification applications, ranging from personal smartphones to border control systems.
Anas Husseis   +2 more
doaj   +1 more source

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors [PDF]

open access: yes2021 IEEE Symposium on Security and Privacy (SP), 2021
To appear in the Proceedings of the IEEE Symposium on Security & Privacy ...
Iqbal, Umar   +2 more
openaire   +2 more sources

Fingerprinting hysteresis [PDF]

open access: yesPhysica B: Condensed Matter, 2004
4 pages, 5 ...
Katzgraber, Helmut G.   +2 more
openaire   +2 more sources

Identification of seeds based on molecular markers and secondary metabolites in Senna obtusifolia and Senna occidentalis

open access: yesBotanical Studies, 2017
Background Senna obtusifolia and Senna occidentalis (Leguminosae), whose seeds have similar appearance and chemical constituents, are easily confused in using their seeds. To elucidate the similarities and differences between S.
Renjun Mao   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy