Search results for " forensics"

showing 10 items of 30 documents

Pesticide occurrence in the waters of Júcar River, Spain from different farming landscapes.

2017

A combined methodology to identify and quantify farming chemicals in the entire Júcar River basin has been developed. The procedure consisted of the application of environmental forensic criteria associating laboratory analytical samples, cartographic analysis using Geographical Information Systems (GIS) and synthetic statistical analysis. Sampling involved the collection of 15 samples in surface waters distributed alongside the Júcar River and its two main tributaries (Cabriel and Magro Rivers). The analytical procedure involves generic sample extraction and selective determination of up to 50 target pesticides by liquid chromatography coupled to tandem mass spectrometry (LC-MS/MS). Geogra…

IrrigationEnvironmental Engineering010504 meteorology & atmospheric sciencesDrainage basinMediterranean environment010501 environmental sciences01 natural sciencesTributaryEnvironmental ChemistryEnvironmental forensicsStatistical analysisWaste Management and Disposal0105 earth and related environmental sciencesHydrologygeographyEmerging contaminantsgeography.geographical_feature_categoryLandscape chemistryLand usebusiness.industrySpatial analysisSampling (statistics)PesticidePollutionAgricultureEnvironmental sciencebusinessThe Science of the total environment
researchProduct

Uranium from German Nuclear Power Projects of the 1940s— A Nuclear Forensic Investigation

2015

Here we present a nuclear forensic study of uranium from German nuclear projects which used different geometries of metallic uranium fuel. Through measurement of the (230)Th/(234)U ratio, we could determine that the material had been produced in the period from 1940 to 1943. To determine the geographical origin of the uranium, the rare-earth-element content and the (87)Sr/(86)Sr ratio were measured. The results provide evidence that the uranium was mined in the Czech Republic. Trace amounts of (236)U and (239)Pu were detected at the level of their natural abundance, which indicates that the uranium fuel was not exposed to any major neutron fluence.

Isotopes of uraniumbusiness.industryWirtz KarlNuclear forensicsnuclear forensicsRadiochemistrychemistry.chemical_elementGeneral ChemistryActinideNuclear powerUraniumCommunicationsCatalysisuraniumUranium-236chemistryUranium-234Environmental scienceHeisenberg WernerbusinessPlutonium-239mass spectrometryAngewandte Chemie International Edition
researchProduct

Two tiered privacy enhanced intrusion detection system architecture

2009

The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.

Network forensicsInformation privacyComputer sciencePrivacy policyLaw enforcementXACMLComputingMilieux_LEGALASPECTSOFCOMPUTINGIntrusion detection systemNetwork monitoringComputer securitycomputer.software_genreHost-based intrusion detection systemcomputercomputer.programming_language2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
researchProduct

Cover Picture: Uranium from German Nuclear Power Projects of the 1940s— A Nuclear Forensic Investigation (Angew. Chem. Int. Ed. 45/2015)

2015

Nuclear physicsEngineeringchemistrybusiness.industryNuclear forensicschemistry.chemical_elementCover (algebra)General ChemistryNuclear powerUraniumbusinessCatalysisNuclear chemistryAngewandte Chemie International Edition
researchProduct

Nuclear Forensics: A methodology applicable to Nuclear Security and to Non-Proliferation

2011

Nuclear Security aims at the prevention and detection of and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material". Nuclear Forensics is a key element of nuclear security. Nuclear Forensics is defined as a methodology that aims at re-establishing the history of nuclear material of unknown origin. It is based on indicators that arise from known relationships between material characteristics and process history. Thus, nuclear forensics analysis includes the characterization of the material and correlation with production history. To this end, we can make use of parameters such as the isotopic composition of the nuclear material…

Nuclear reactionHistoryComputer scienceNuclear engineeringNuclear forensicschemistry.chemical_elementNuclear materialUraniumIsotopic compositionComputer Science ApplicationsEducationCharacterization (materials science)PlutoniumNuclear physicschemistryNeutron
researchProduct

The Law of Service Robots

2014

Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…

Robots drones remotely piloted aerial systems ENAC liability privacy data protection commons intellectual property digital forensics cyber-security criminal liabilitySettore IUS/01 - Diritto Privato
researchProduct

A vision-based fully automated approach to robust image cropping detection

2020

Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content th…

Robust computer visionExploitComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRobust statisticsImage processing02 engineering and technologyCropping detectionMultimedia forensicRobustness (computer science)0202 electrical engineering electronic engineering information engineeringMultimedia Forensics Robust Computer Vision Cropping Detection Image Content AnalysisComputer visionElectrical and Electronic EngineeringSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - InformaticaVision basedbusiness.industryDetectorImage content analysi020206 networking & telecommunicationsFully automatedSignal Processing020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessCroppingSoftwareSignal Processing: Image Communication
researchProduct

The analysis of SUDEP forensic autopsies leading to preventable events

2023

Introduction: The diagnosis of unexpected death by excluding non-natural causes, particularly in subjects with epilepsy, is a topic of interest and it is difficult to identify in the forensic field. Health professionals sometimes are faced with cases of sudden death, generally in young adults with a long history of epilepsy that require, for judicial purposes, an explanation in terms of cause and means to determine the death. SUDEP is an entity diagnosed by the exclusion of other causes that may have led to death, and then for forensic purposes, it requires particular attention and knowledge, and there is difficulty in identifying it. Our contribution aims to illustrate the scientific commu…

SUDEP epilepsy forensics autopsy research preventable events artificial intelligence
researchProduct

Copy–Move Forgery Detection by Matching Triangles of Keypoints

2015

Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and CommunicationsComputer scienceDelaunay triangulationbusiness.industryFeature vectorSURFFeature extractionScale-invariant feature transformPattern recognitionDelaunay TriangulationDigital Image ForensicVisualizationVertex (geometry)Copy-move ForgeryDigital imageComputer Networks and CommunicationHarriSIFTComputer visionArtificial intelligenceSafety Risk Reliability and QualitybusinessCopy-move Forgery; Delaunay Triangulation; Digital Image Forensics; Harris; SIFT; SURF; Computer Networks and Communications; Safety Risk Reliability and QualityTransformation geometryIEEE Transactions on Information Forensics and Security
researchProduct

A tool to support the creation of datasets of tampered videos

2015

Digital Video Forensics is getting a growing interest from the Multimedia research community, as the need for methods to validate the authenticity of a video content is increasing with the number of videos freely available to the digital users. Unlike Digital Image Forensics, to our knowledge, there are not standard datasets to test video forgery detection techniques. In this paper we present a new tool to support the users in creating datasets of tampered videos. We furthermore present our own dataset and we discuss some remarks about how to create forgeries difficult to be detected by an observer, to the naked eye.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCopy move forgeryCopy move forgeryInformation retrievalVideo forensicComputer scienceForgery detectionComputer Science (all)Digital videoComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONObject trackingCopy move forgery; Object tracking; Video forensics; Computer Science (all); Theoretical Computer ScienceData scienceTheoretical Computer ScienceVideo trackingResearch communityDigital image forensics
researchProduct