Here is a high demand for multimedia forensics analysts to locate the original camera of photographs and videos that are being taken nowadays. There has been considerable progress in the technology of identifying the ...
详细信息
Here is a high demand for multimedia forensics analysts to locate the original camera of photographs and videos that are being taken nowadays. There has been considerable progress in the technology of identifying the source of data, which has enabled conflict resolutions involving copyright infringements and identifying those responsible for serious offenses to be resolved. Video source identification is a challenging task nowadays due to easily available editing tools. This study focuses on the issue of identifying the camera model used to acquire video sequences used in this research that is, identifying the type of camera used to capture the video sequence under investigation. For this purpose, we created two distinct CNN-based camera model recognition techniques to be used in an innovative multi-modal setting. The proposed multi-modal methods combine audio and visual information in order to address the identification issue, which is superior to mono-modal methods which use only the visual or audio information from the investigated video to provide the identification information. According to legal standards of admissible evidence and criminal procedure, Forensic Science involves the application of science to the legal aspects of criminal and civil law, primarily during criminal investigations, in line with the standards of admissible evidence and criminal procedure in the law. It is responsible for collecting, preserving, and analyzing scientific evidence in the course of an investigation. It has become a critical part of criminology as a result of the rapid rise in crime rates over the last few decades. Our proposed methods were tested on a well-known dataset known as the Vision dataset, which contains about 2000 video sequences gathered from various devices of varying types. It is conducted experiments on social media platforms such as YouTube and WhatsApp as well as native videos directly obtained from their acquisition devices by the means of their acquisiti
Existing deep learning-based point cloud denoising methods are generally trained in a supervised manner that requires clean data as ground-truth ***,in practice,it is not always feasible to obtain clean point *** this...
详细信息
Existing deep learning-based point cloud denoising methods are generally trained in a supervised manner that requires clean data as ground-truth ***,in practice,it is not always feasible to obtain clean point *** this paper,we introduce a novel unsupervised point cloud denoising method that eliminates the need to use clean point clouds as groundtruth labels during *** demonstrate that it is feasible for neural networks to only take noisy point clouds as input,and learn to approximate and restore their clean *** particular,we generate two noise levels for the original point clouds,requiring the second noise level to be twice the amount of the first noise *** this,we can deduce the relationship between the displacement information that recovers the clean surfaces across the two levels of noise,and thus learn the displacement of each noisy point in order to recover the corresponding clean *** experiments demonstrate that our method achieves outstanding denoising results across various datasets with synthetic and real-world noise,obtaining better performance than previous unsupervised methods and competitive performance to current supervised methods.
Ovarian cancer is a global health concern due to the unavailability of an effective screening strategy and is often diagnosed at a late stage with approximately 70% of the case which reduces the survival chances of pa...
详细信息
Research in the field of malware detection is currently leaning toward methods based on artificial intelligence algorithms due to the increasing limitations of traditional detection methods and the increasing accuracy...
详细信息
Advances in IT technology have led to research into KUSHO recognition, which enables the non-contact operation of devices without the use of devices such as keyboards or controllers. This is a technology that transmit...
详细信息
Advances in IT technology have led to research into KUSHO recognition, which enables the non-contact operation of devices without the use of devices such as keyboards or controllers. This is a technology that transmits information about the characters written in space towards the camera (hereafter this action is referred to as KUSHO) to the devices. KUSHO has advantages, such as the ability to transfer information without training. In restaurant kitchens, workers transmit various types of information using devices with input functions, however, hygiene considerations are essential when operating equipment in kitchens. In addition, in noisy kitchens, it is also difficult to use voice input, and there are limits to paper-based information transmission. Under these circumstances, in this research, the introduction of KUSHO input technology for non-contact information transfer in restaurant kitchens is being investigated. Therefore, the content handled by kitchen workers for information management is first analyzed and shown to be representable in three input formats. Subsequently, an additional hand signal to be used while doing KUSHO and an improved algorithm for determining them are proposed. Finally, an algorithm for KUSHO recognition of character strings using standard input time is proposed. Experiments on the implementation of these proposals have shown the effectiveness of the new decision algorithm for the addition of a hand signal, with a 100% correct rate. For strings of two or more uppercase alphabetic characters, the recognition rate was 92.5% for all eight types of "KUSHO operation" and the recognition rate was 70.0% for ten randomly selected from 100 different "product names." For "quantity," it was difficult to recognize multiple digits, however 100% recognition rate was achieved by dividing the digits into each single digit 0~9 using an improved hand signal algorithm. Thus, algorithm some problems remain, the effectiveness of all the proposed methods ha
Heat kernel smoothing (HKS) over graph is a valuable tool for reducing noise in irregular graph signals. In the conventional HKS method, the discrete heat equation (DHE) is derived by replacing the continuous Laplacia...
详细信息
Social network analysis provides quantifiable methods and topological metrics to examine the networked structure for several interdisciplinary applications. In our research, a social network of GitHub community is con...
详细信息
Ransomware, a form of malicious software, encrypts victim data and renders it inaccessible until a ransom is paid. Different ransomware variants employ various tactics to avoid detection during their attacks. Understa...
详细信息
Autism spectrum disorder (ASD) is a prevalent issue contributing to deprivation among people in terms of their capability to maintain social relationships and interact normally with fellow members of society. Teens wi...
详细信息
With the surge in wireless communication services, spectrum resources have grown scarce, posing a significant hindrance to the industry's expansion. Traditional static spectrum allocation falls short in addressing...
详细信息
暂无评论