標題: Titlebook: Computational Forensics; 4th International Wo Hiroshi Sako,Katrin Y. Franke,Shuji Saitoh Conference proceedings 2011 Springer Berlin Heidel [打印本頁] 作者: T-cell 時間: 2025-3-21 16:03
書目名稱Computational Forensics影響因子(影響力)
書目名稱Computational Forensics影響因子(影響力)學科排名
書目名稱Computational Forensics網(wǎng)絡公開度
書目名稱Computational Forensics網(wǎng)絡公開度學科排名
書目名稱Computational Forensics被引頻次
書目名稱Computational Forensics被引頻次學科排名
書目名稱Computational Forensics年度引用
書目名稱Computational Forensics年度引用學科排名
書目名稱Computational Forensics讀者反饋
書目名稱Computational Forensics讀者反饋學科排名
作者: 是比賽 時間: 2025-3-21 20:49 作者: 招募 時間: 2025-3-22 00:30
Second order vectors and forms,em based on contour features operating in identification mode (one-to-many) and working at the level of isolated characters. Individual characters of a writer are manually segmented and labeled by an expert as pertaining to one of 62 alphanumeric classes (10 numbers and 52 letters, including lowerca作者: deactivate 時間: 2025-3-22 07:01
Riemannian manifolds and Brownian motions,ts. To extract the stroke order variation of an input character pattern, it is necessary to establish the accurate stroke correspondence between the input pattern and the reference pattern of the same category. In this paper we compare five stroke correspondence methods: the individual correspondenc作者: FIS 時間: 2025-3-22 12:28 作者: 損壞 時間: 2025-3-22 16:37
Asymptotic Expansion and Weak Convergence, dental CT images is proposed. In the previous method, one of the main issue is the mis-extraction of the adjacent region caused by the similarity of feature between a tooth and its adjacent teeth or the surrounding alveolar bone. It is important to extract an accurate shape of the target tooth as a作者: 損壞 時間: 2025-3-22 17:33 作者: cumber 時間: 2025-3-22 23:24
Gaussian Stochastic Calculus of Variations, work with highly degraded footwear marks and match them to the most similar footwear print available in the database. Retrieval process from a large database can be made significantly faster if the database footwear prints are clustered beforehand. In this paper we propose a footwear print retrieva作者: 激怒 時間: 2025-3-23 05:27
https://doi.org/10.1007/3-540-30799-0ximum entropy method (MEM). The purpose of this study is to improve the efficiency of inkjet printer model identification based on spur mark comparison method (SCM) in the field of forensic document analysis. Experiments were performed using two spur gears in different color inkjet printer models. T作者: Range-Of-Motion 時間: 2025-3-23 05:32
Gaussian Stochastic Calculus of Variations,g diodes (LEDs). According to conventional methods indentations were observed by document examiners’ eyes using a microscope. However it is difficult to estimate depths of the indentations because human eyes only can observe shades and brightness made by indentations instead of measuring the depths 作者: adequate-intake 時間: 2025-3-23 10:17
Asymptotic Expansion and Weak Convergence, in monochrome. Since partial copies and similar copies are always applied in plagiarisms of line drawings, we propose combining the technique of object detection and image retrieval to detect similar partial copies from suspicious images: first, detecting regions of interest?(ROIs) by a cascade cla作者: 不舒服 時間: 2025-3-23 15:34 作者: MELON 時間: 2025-3-23 21:17 作者: 甜食 時間: 2025-3-23 22:18 作者: GROUP 時間: 2025-3-24 04:31 作者: 涂掉 時間: 2025-3-24 08:06
Stochastic Calculus via Regularizationse preprocessing methods used in automatic fingerprint identification system (AFIS). Proposed algorithm consists of two weighted averaging stages over a neighborhood. In the first stage the 2D gaussian kernel is used as a weight and in the second stage the differentiation mask is used. That strategy 作者: colloquial 時間: 2025-3-24 12:58 作者: URN 時間: 2025-3-24 15:51 作者: ARBOR 時間: 2025-3-24 21:49 作者: 惰性氣體 時間: 2025-3-25 00:17
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/232312.jpg作者: 正論 時間: 2025-3-25 06:05 作者: Indent 時間: 2025-3-25 10:55
978-3-642-19375-0Springer Berlin Heidelberg 2011作者: NEXUS 時間: 2025-3-25 14:31 作者: FELON 時間: 2025-3-25 16:24 作者: saphenous-vein 時間: 2025-3-25 20:24 作者: maladorit 時間: 2025-3-26 00:17 作者: Individual 時間: 2025-3-26 05:04
Detection of Malicious Applications on Android OSfeatures, namely the set of permissions exposed by each application. The methodology has been trained on more than 13,000 applications hosted on the Android Market, collected with AppAware. A case study is presented as a preliminary validation of the methodology.作者: BRIDE 時間: 2025-3-26 11:46 作者: 不在灌木叢中 時間: 2025-3-26 14:48
Stochastic Calculus in Infinite Dimensions,A recently emerging new family of neural network architectures, based on the model of neural group processing, on the contrary, shows even in its mostly still premature state (from engineering point of view) already a much stronger relevance to the modeling of Gestalt aspects.作者: tackle 時間: 2025-3-26 19:45
https://doi.org/10.1007/978-3-031-69586-5icit drugs and chemical weapons. In addition, we developed a small mass spectrometer that can detect human breath. This simple method is useful for preventing drunk driving by installing its device just behind a steering wheel.作者: Ankylo- 時間: 2025-3-26 21:09 作者: figment 時間: 2025-3-27 01:33
https://doi.org/10.1007/3-540-30799-0e for training the seal verification algorithms and testing the proposed verification system. Experiments showed that the symbolic representation method was superior to traditional SVM classifier in this task. Experiments also showed that our statistical feature was very powerful for seal verification application.作者: 裙帶關(guān)系 時間: 2025-3-27 08:17 作者: ambivalence 時間: 2025-3-27 10:34
Gestalt Aspects of Security PatternsA recently emerging new family of neural network architectures, based on the model of neural group processing, on the contrary, shows even in its mostly still premature state (from engineering point of view) already a much stronger relevance to the modeling of Gestalt aspects.作者: 細胞 時間: 2025-3-27 14:23
Physical Security Technologies at Hitachiicit drugs and chemical weapons. In addition, we developed a small mass spectrometer that can detect human breath. This simple method is useful for preventing drunk driving by installing its device just behind a steering wheel.作者: ENDOW 時間: 2025-3-27 21:30 作者: 種族被根除 時間: 2025-3-27 23:37
A Novel Seal Imprint Verification Method Based on Analysis of Difference Images and Symbolic Represee for training the seal verification algorithms and testing the proposed verification system. Experiments showed that the symbolic representation method was superior to traditional SVM classifier in this task. Experiments also showed that our statistical feature was very powerful for seal verification application.作者: 魅力 時間: 2025-3-28 04:20
Extraction of 3D Shape of a Tooth from Dental CT Images with Region Growing Methodh or a dental enamel by the mean shift clustering. Then, some segments in the certain tooth is extracted as a certain region by the region growing method. Finally, the contour of the tooth is specified by applying the active contour method, and the shape of the tooth is extracted.作者: mosque 時間: 2025-3-28 09:10 作者: 代理人 時間: 2025-3-28 11:39
Asymptotic Expansion and Weak Convergence,ssifier; then, locate the corresponding source parts from copyrighted images using a feature matching method. The experimental results have proved the effectiveness of proposed method for detecting similar partial copies from complex backgrounds.作者: interpose 時間: 2025-3-28 17:26 作者: Generator 時間: 2025-3-28 19:13 作者: iodides 時間: 2025-3-29 01:27
Radically Elementary Probability Theory,ng traces of attacks. Since real-world data are often not available synthetic data are necessary to perform testing. With 3LSPG we propose a systematic method to generate synthetic test data which contain traces of selected attacks. These data can then be used to evaluate the performance of different forensic tools.作者: PHAG 時間: 2025-3-29 05:32 作者: characteristic 時間: 2025-3-29 09:24 作者: THROB 時間: 2025-3-29 14:11
What Kind of Strategies Does a Document Examiner Take in Handwriting Identification?agram-like 36 handwriting samples written by 6 writers were used as stimuli were done by visual inspection and cluster analysis. Results of the experiments suggested that the examiner utilized his knowledge on writing motion even when the classification target was a diagram drawn by the reconstruction of a handwriting sample.作者: intangibility 時間: 2025-3-29 17:39
3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Datang traces of attacks. Since real-world data are often not available synthetic data are necessary to perform testing. With 3LSPG we propose a systematic method to generate synthetic test data which contain traces of selected attacks. These data can then be used to evaluate the performance of different forensic tools.作者: 制定法律 時間: 2025-3-29 22:14 作者: GIBE 時間: 2025-3-30 00:42
Conference proceedings 2011 Japan in November 2010. The 16 revised full papers presented together with two invited keynote papers were carefully selected during two rounds of reviewing and revision. The papers cover a wide range of current topics in computational forensics including authentication, biometrics, document analys作者: deciduous 時間: 2025-3-30 07:28
Second order vectors and forms,se of 30 writers from real forensic documents show that the character class information given by the manual analysis provides a valuable source of improvement, justifying the significant amount of time spent in manual segmentation and labeling by the forensic specialist.作者: CAPE 時間: 2025-3-30 10:03
Gaussian Stochastic Calculus of Variations,atures and represented by an Attributed Relational Graph. Similarity between prints is computed using Footwear Print Distance. The proposed system is invariant to distortions like scale, rotation, translation and works well with the partial prints, color prints and crime scene marks.作者: NADIR 時間: 2025-3-30 13:55 作者: DECRY 時間: 2025-3-30 16:52 作者: AMPLE 時間: 2025-3-30 23:44
https://doi.org/10.1007/3-540-30799-0are gaze patterns from experts with those obtained from novices. Our results show that experts and novices generate similar overall gaze patterns. However, a deeper data analysis using machine translation reveals that experts are able to identify more corresponding areas between two prints within a short period of time.作者: Congruous 時間: 2025-3-31 03:04
Stochastic Calculus via Regularizations results show that the probability that at least one fingerprint in the FBI IAFIS databases (over 470 million fingerprints) matches the bomb site latent is 0.93 which is large enough to lead to misidentification.作者: Patrimony 時間: 2025-3-31 05:45 作者: 羽毛長成 時間: 2025-3-31 09:28
Footwear Print Retrieval System for Real Crime Scene Marksatures and represented by an Attributed Relational Graph. Similarity between prints is computed using Footwear Print Distance. The proposed system is invariant to distortions like scale, rotation, translation and works well with the partial prints, color prints and crime scene marks.作者: 不適 時間: 2025-3-31 13:42 作者: 連鎖,連串 時間: 2025-3-31 17:41
Detecting Indentations on Documents Pressed by Pen Tip Force Using a Near Infrared Light Emitting Diforensic document examiners to approximately evaluate the depths of indentations of handwriting by our proposal method because the method will be lead to convenient discrimination between forgery handwriting and genuine one.作者: irritation 時間: 2025-3-31 23:00