Results 91 to 100 of about 36,393 (285)

Source Camera Identification and Detection in Digital Videos through Blind Forensics [PDF]

open access: green, 2023
Venkata Udaya Sameer   +3 more
openalex   +1 more source

Probing Metal Tip‐Induced Bond Weakening of a Reactive Alkyne Center Aligned via a Rigid Triphenylmethane‐Based Tripod on Au(111) by TERS and DFT

open access: yesJournal of Raman Spectroscopy, EarlyView.
We investigate tip‐induced bond weakening of a single alkyne center immobilized and aligned upright on Au(111) using a rigid triphenylmethane‐based tripod. By varying the tip–molecule distance, we observe shifts in the ≡C–H and –C≡C– vibrational bands via ultrahigh vacuum low‐temperature tip‐enhanced Raman scattering (TERS).
Gang Li   +12 more
wiley   +1 more source

Automated Imaging of Cultured Bacteria in Picoliter Droplets by Coherent Anti‐Stokes Raman Scattering and Two‐Photon Excited Fluorescence Microscopy

open access: yesJournal of Raman Spectroscopy, EarlyView.
We present an automated system that combines an image‐based fuzzy logic controller for precise positioning of microfluidic picoliter droplets with nonlinear microscopy, using CARS and TPEF modalities for detailed analysis of droplet composition. Time series and z‐stack images of E. coli, B. subtilis, and M. arborescens were recorded.
Fabian Ott   +6 more
wiley   +1 more source

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Boosting Image Forgery Detection using Resampling Features and Copy-move analysis

open access: yes, 2018
Realistic image forgeries involve a combination of splicing, resampling, cloning, region removal and other methods. While resampling detection algorithms are effective in detecting splicing and resampling, copy-move detection algorithms excel in ...
Bappy, Jawadul H.   +8 more
core  

The Interactional Pathways of Mass Killings: Toward a Novel Understanding of Rampage School Shootings

open access: yesSymbolic Interaction, EarlyView.
Rampage school shootings, where students go to their own school to randomly kill classmates, teachers, friends, and strangers, are among the most drastic types of human behavior. While research increasingly points to interaction dynamics as being key for the emergence of crime and violence, scholars have not yet systematically studied interaction ...
Anne Nassauer
wiley   +1 more source

Rethinking Face‐to‐Face Interaction: Lessons from Studies of “Autistic Sociality”

open access: yesSymbolic Interaction, EarlyView.
Face‐to‐face interaction is a foundational concept in microsociology. This article surveys the social experiences of autistic people, who are commonly known for having a strained relationship with interactions face to face. By interpretively reviewing and synthesizing the broader literature on “autistic sociality,” the article provides a nuanced ...
Lars E. F. Johannessen
wiley   +1 more source

Mobile device forensics: a snapshot [PDF]

open access: yes
In the increasingly dynamic environment of mobile forensics, this paper provides an overview of the capabilities of three popular mobile forensic tools on three mobile phones based on Apple’s iOS, Google’s Android and RIM’s BlackBerry operating systems.
Ben Martini   +3 more
core  

Home - About - Disclaimer - Privacy