Results 61 to 70 of about 50,349 (279)

Multi‐Scale Mapping of Gene Expression from Whole‐slide Images for Identifying Phenotype‐Associated Subpopulations

open access: yesAdvanced Science, EarlyView.
BiSCALE: A pathology‐driven deep learning framework for multi‐scale gene expression prediction from whole‐slide images. It accurately infers bulk and near‐cellular spot‐level expression, links predictions to clinical phenotypes, identifies disease‐associated niches, and enables applications in risk stratification and cell‐identity annotation, providing
Hailong Zheng   +8 more
wiley   +1 more source

Analyzing Benford’s Law’s Powerful Applications in Image Forensics

open access: yesApplied Sciences, 2021
The Newcomb–Benford law states that in a set of natural numbers, the leading digit has a probability distribution that decays logarithmically. One of its major applications is the JPEG compression of images, a field of great interest for domains such as ...
Diana Crișan   +6 more
doaj   +1 more source

Rapid and Direct Detection of Methamphetamine in Biofluids using a MXene‐Enabled Electrochemical Sensor

open access: yesAdvanced Science, EarlyView.
A MXene‐enhanced electrochemical sensor enables the rapid and direct detection of methamphetamine. Molecular simulations reveal that specific MXene surface functional groups act as key signal amplifiers by facilitating interfacial interactions. The sensor demonstrates high sensitivity and robust performance in complex biological matrices.
Ri Wang   +7 more
wiley   +1 more source

iPhone forensics methodology and tools [PDF]

open access: yes, 2008
iPhone mobile devices are rapidly overtaking the new generation of mobile phones market, especially among the young generation. It is also gaining a lot of popularity among security specialists and fancy gadgets for collectors.
Al-Hajri, Haitham, Sansurooah, Krishnun
core   +1 more source

Image Splicing Localization Using A Multi-Task Fully Convolutional Network (MFCN)

open access: yes, 2017
In this work, we propose a technique that utilizes a fully convolutional network (FCN) to localize image splicing attacks. We first evaluated a single-task FCN (SFCN) trained only on the surface label.
Kuo, C. -C. Jay   +2 more
core   +1 more source

EEPD1 Inhibition Unleashes Antitumor Immunity in Colorectal Cancer by Activating the cGAS‐STING Pathway

open access: yesAdvanced Science, EarlyView.
In colorectal cancer, high expression of the DNA repair protein EEPD1 correlates with immune exclusion and poor prognosis. This study demonstrates that EEPD1 depletion induces genomic instability, leading to cytosolic DNA accumulation and subsequent activation of the cGAS‐STING‐type I interferon pathway. This cascade remodels the tumor microenvironment
Liyun Huo   +8 more
wiley   +1 more source

Autoencoder with recurrent neural networks for video forgery detection

open access: yes, 2017
Video forgery detection is becoming an important issue in recent years, because modern editing software provide powerful and easy-to-use tools to manipulate videos.
Cozzolino, Davide   +3 more
core   +1 more source

“Will you be there for me?” Social support from family and friends during cold case sexual assault prosecutions

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell   +4 more
wiley   +1 more source

Decoding Innocence: Advancing Forensic Facial Discrimination through Comparative Analysis of Conventional CNN and Advanced Architectures

open access: yesJOIV: International Journal on Informatics Visualization
The field of Digital Image Forensics (DIF) faces a critical issue in accurately identifying children in digital images, notably in cases involving the proliferation of child sexual abuse content. Existing techniques face hurdles due to model architecture
Mirza Jamal Ahmed, Nurul Azma Abdullah
doaj   +1 more source

Secure and efficient DRM watermark algorithm of forensics in mobile internet

open access: yesEURASIP Journal on Image and Video Processing, 2018
With the development of mobile Internet technology, the characteristic of easy editing, transmitting, and forging the digital media bring great challenges in authenticity of multimedia.
Ma Zhaofeng, Jiang Ming
doaj   +1 more source

Home - About - Disclaimer - Privacy