Search results for " forensics"
showing 10 items of 30 documents
Pesticide occurrence in the waters of Júcar River, Spain from different farming landscapes.
2017
A combined methodology to identify and quantify farming chemicals in the entire Júcar River basin has been developed. The procedure consisted of the application of environmental forensic criteria associating laboratory analytical samples, cartographic analysis using Geographical Information Systems (GIS) and synthetic statistical analysis. Sampling involved the collection of 15 samples in surface waters distributed alongside the Júcar River and its two main tributaries (Cabriel and Magro Rivers). The analytical procedure involves generic sample extraction and selective determination of up to 50 target pesticides by liquid chromatography coupled to tandem mass spectrometry (LC-MS/MS). Geogra…
Uranium from German Nuclear Power Projects of the 1940s— A Nuclear Forensic Investigation
2015
Here we present a nuclear forensic study of uranium from German nuclear projects which used different geometries of metallic uranium fuel. Through measurement of the (230)Th/(234)U ratio, we could determine that the material had been produced in the period from 1940 to 1943. To determine the geographical origin of the uranium, the rare-earth-element content and the (87)Sr/(86)Sr ratio were measured. The results provide evidence that the uranium was mined in the Czech Republic. Trace amounts of (236)U and (239)Pu were detected at the level of their natural abundance, which indicates that the uranium fuel was not exposed to any major neutron fluence.
Two tiered privacy enhanced intrusion detection system architecture
2009
The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.
Cover Picture: Uranium from German Nuclear Power Projects of the 1940s— A Nuclear Forensic Investigation (Angew. Chem. Int. Ed. 45/2015)
2015
Nuclear Forensics: A methodology applicable to Nuclear Security and to Non-Proliferation
2011
Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material". Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that arise from known relationships between material characteristics and process history. Thus, nuclear forensics analysis includes the characterization of the material and correlation with production history. To this end, we can make use of parameters such as the isotopic composition of the nuclear material…
The Law of Service Robots
2014
Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…
A vision-based fully automated approach to robust image cropping detection
2020
Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content th…
The analysis of SUDEP forensic autopsies leading to preventable events
2023
Introduction: The diagnosis of unexpected death by excluding non-natural causes, particularly in subjects with epilepsy, is a topic of interest and it is difficult to identify in the forensic field. Health professionals sometimes are faced with cases of sudden death, generally in young adults with a long history of epilepsy that require, for judicial purposes, an explanation in terms of cause and means to determine the death. SUDEP is an entity diagnosed by the exclusion of other causes that may have led to death, and then for forensic purposes, it requires particular attention and knowledge, and there is difficulty in identifying it. Our contribution aims to illustrate the scientific commu…
Copy–Move Forgery Detection by Matching Triangles of Keypoints
2015
Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…
A tool to support the creation of datasets of tampered videos
2015
Digital Video Forensics is getting a growing interest from the Multimedia research community, as the need for methods to validate the authenticity of a video content is increasing with the number of videos freely available to the digital users. Unlike Digital Image Forensics, to our knowledge, there are not standard datasets to test video forgery detection techniques. In this paper we present a new tool to support the users in creating datasets of tampered videos. We furthermore present our own dataset and we discuss some remarks about how to create forgeries difficult to be detected by an observer, to the naked eye.