DIGITALIZATION OF COLLECTIONS IN FORENSIC INVESTIGATION

Author(s):  
A. M. Moiseev ◽  
◽  

The paper considers the issue of extensive application of local expert collections in forensic expert practice. The study shows that the necessity of extensive application of such collections and other local reference-assistive means occurs due to criminalistics digitalization. The author specifies the concept of local expert collections; proposes to carry out expert collections digitalization according to the matrix principle of the object’s characteristics fixation. The study identified that the practicality of the extensive application of such collections is caused by the network approach introduction to the forensic expert activity. The author proves the applicability of semantic networks to ensure the efficiency of using expert collections. The necessity to overcome the experienced counter-acting the investigation determines the importance of extensive application of digitalized collections. The author implements the technological approach to the expert studies using the specimen copies from expert collections; proposes to support the information provision block in the forensic expert study technologies with references to the local collections stored in a cloud resource. Within the block of assignments for forensic studies, it is offered to provide an initiative comparison of an object under the study with the collection standards regarding falsification or other change in its characteristics. It provides information security measures. Such measures are the collection exchange channel duplication and block-chain technology. The paper presents a validation procedure for expert collections located in network resources of forensic expert institutions. Expert collection validation involves the research activities regarding the adequacy of their digital representation and the expert collections approval in terms of applicability for solving particular expert tasks. Complex application of expert collections represented in digital format supplies digital criminalistics with new forensic investigation resources.

Author(s):  
D. B. Nurseitov ◽  
N. A. Toiganbayeva ◽  
M. O. Kenzhebayeva

The article is devoted to the program "Converter", which allows you to translate the geologic-lithological profile of a mineral field into a digital format in the form of a two-dimensional array. The object-oriented programming language Python was used to write the program. The NumPy, OpenCV, and MatPlotlib libraries are actively used. The implementation of this program is based on image segmentation and finding the prevailing colors in the OpenCV library. Image segmentation is a preliminary step in image processing. The obtained values allow you to find out the density distribution in the area under consideration. The program "Converter" has a good graphical representation of the results obtained using the MatPlotlib library. The program writes the final converted result as a two-dimensional array to a text file along the desired path. Thus, the matrix is easy to read for further use in conjunction with other programs. The purpose of this work was to create a program that converts the geologic-lithological profile of the field into a digital format in the form of a two-dimensional array, for further use of this matrix as the distribution density of the oil field. The "Converter" program converts any geologic-lithological profile into a two-dimensional array in a matter of minutes.


Holzforschung ◽  
2014 ◽  
Vol 68 (1) ◽  
pp. 17-21 ◽  
Author(s):  
Hao Wang ◽  
Genlin Tian ◽  
Hankun Wang ◽  
Wanju Li ◽  
Yan Yu

Abstract Thermoplastic polymer composites reinforced with short plant fiber are worldwide in focus of research activities. Interfacial shear strength (IFSS) is an important indicator for evaluating the bonding quality between the fiber and the matrix polymer. However, the direct measurement of IFSS is especially difficult in the case of short fibers. In the present article, a method is proposed to this purpose, which is related to the known “fiber pulling out” methodology. In the case of single bamboo fibers, the IFSS in a polypropylene (PP) matrix was on, an average, of 5 MPa, which can be considered as weak. Scanning electron microscopy images revealed a rough inner surface in PP cavities left after fiber pulling out. This is direct evidence that a mechanical interlocking mechanism is active in the interphase between the hydrophilic fibers and the hydrophobic matrix.


2021 ◽  
Vol 2134 (1) ◽  
pp. 012025
Author(s):  
Dmitriy Pokamestov ◽  
Yakov Kryukov ◽  
Eugeniy Rogozhnikov ◽  
Islam Kanatbekuli ◽  
Edgar Dmitriyev

Abstract Sparse code multiple access (SCMA) is one of the promising implementations of non-orthogonal multiple access (NOMA) methods. SCMA provides high spectral efficiency and a large number of network resources. We describe a communication system with SCMA, space-time block coding (STBC), multiple input multiple output (MIMO) technology, and orthogonal frequency division multiplexing (OFDM). The architecture of such systems, including algorithms of formation and processing of signals is considered. A method for adapting signals to the state of the spatial channel transmission based on information about the matrix of channel coefficients is proposed. The application of such adaptation allows to compensate the influence of the channel and to reduce the probability of bit errors. We consider the bit error rate (BER) performance of the communication system in different channel models and show the effectiveness of the proposed methods.


2021 ◽  
Author(s):  
Natália Botica

Archaeology produces large quantities of data, much of it already in a born-digital format. The preservation of these data is vital, as they result from unrepeatable actions, and access to and sharing of these data are the engine of research activities and knowledge development. The creation of archaeological data repositories, in addition to safeguarding data, is a valuable step in supporting research, but it requires a series of work processes, namely data standardisation and use of common nomenclatures, so published data are findable and reusable. The creation of an archaeological data repository for Portugal is a fundamental requirement. It would allow the safeguarding of data resulting from archaeological fieldwork, along with those resulting from research, making them findable, accessible and liable to be used in future research or even to be re-analysed using new technologies and tools. This article presents the evolution of the digitisation of archaeological information in Portugal, the responsibilities for its production and safeguarding, as well as the steps to be followed for its availability in a data repository.


This paperis based on security measures to be provided to IoT related data, as there is an increasing demand to secure the IoT devices, networks and applications. The network resources are getting affected as the cybercrimes are increasing day-by-day. In this paper, first we highlight upon the key challenges and security issues in IoT architecture and then focus upon the case study of IoT application in healthcare IoMT, In Healthcare, prevention and cure have seen various advancement in technological schema. The Medical equipment when used with the Internet of Things are termed as Internet of Medical things (IOMT). IoMT is transforming healthcare industry by providing large scale connectivity for medical devices, patients, physicians, clinical and nursing staff who use them and facilitate real-time monitoring supportingthe knowledge gathered from the connected things. Security constraints for IoMT take confidentiality, integrity and authentication as prime key aspect. These can be achievedbytheintegration of physical devices like sensors for connectivity and communication in cloud-based facility which in course is delivered by interface. Access Control security is obtained through key generation for data owners and the user of private health records whilethedata confidentiality is obtained by use of Advanced Encryption Standard (AES)as an efficientencryptionalgorithm


Author(s):  
Denis Cavallucci ◽  
Philippe Lutz ◽  
Dmitry Kucharavy

The efficiency of the design process in companies today is largely dependent on the skills of individual members of project teams, the capacity of the software available on the market and any assistance provided by the tools and methods found scattered around the industrial world. Within this context, there have been myriad attempts to optimize the different stages in the design process by using computerization, but a growing proportion of current research work on design tends to agree that the crucial point in the act of designing lies in the phase where inventive ideas are sought and that without such ideas being generated, there is no successful future for the product. In the framework of a large number of research activities it has been proven that the TRIZ (the Russian acronym of Theory of Inventive Problem Solving) contribution to the science of design has a promising potential [1–2–3–4]. On the other hand, the added value and spectrum of problem typology where TRIZ could help remains unclear for most researchers for various reasons. Originally, since the theory has penetrated the so-called occidental world, every individual took from TRIZ what he thought was right according to his own knowledge about design, problem solving process, creativity or needs forgetting that 95% of scientific literature about TRIZ’s fundamentals was written either in Cyrillic or in unpublished manuscripts. In most cases, theses multitudes of uses did not see that the original idea of TRIZ was to formulate a theory as strong basement for building methods and tools to satisfy designers expectations. This fact led nowadays TRIZ’s image to fuzziness since available literature on the subject only presents case studies and uses of tools (mostly the matrix) although TRIZ’s scope is much wider. To avoid further aggravation of this fact, this paper aims at presenting the first axiom describing TRIZ’s objectives as a basement for our research activities. Two methodological approaches are then presented : the “trial and error” type approach, which is still very much in use everywhere in industry and which aims to explore an area of solution-seeking, following a structural approach or not, through a series of attempts, which often end up in failure. The second approach is the “convergent” approach proposed by the TRIZ body of knowledge and developed as a contribution to design activity’s efficiency in our research center. This approach aims at limiting the sphere of research during a larger and longer problem statement stage to converge towards a small number of solutions in opposition to traditional approaches which consists in generating a large amount of ideas and select the best suitable ones to be implemented. A case study on the internal ventilation of a car will also be presented to illustrate the quality of the results that could be obtained when applying this convergent approach.


2019 ◽  
Vol 214 ◽  
pp. 08001
Author(s):  
Tadashi Murakami ◽  
Fukuko Yuasa ◽  
Ryouichi Baba ◽  
Teiji Nakamura ◽  
Kiyoharu Hashimoto ◽  
...  

This work aims to provide KEK general-purpose network to support various research activities in the fields of high-energy physics, material physics, and accelerator physics. Since the end of the 20th century, on a daily basis, networks experience cyber-attacks and the methods of attack have rapidly evolved to become more sophisticated over the years. Security measures have been developed to mitigate the effects of cyber-attacks. While security measures may improve safety, restrictions might reduce usability. Therefore, we must keep a balance between safety and usability of the network for a smooth running of research activities. Herein, we present our long-term experience with keeping a balance between safety and usability in KEK research activities. The key points are reasonably ensuring traceability and security management. We have been using security devices, such as firewalls, intrusion detection systems, and vulnerability management systems, to achieve a balance between safety and usability. Also, we present activities of the computer security incident response team (CSIRT) and collaborative activities among research organizations.


Author(s):  
Kemelbekova Zhanar Satibaldievna ◽  
Sembiyev O.Z ◽  
Umarova Zh.R

It is often necessary to determine statistical parameters that characterize the quality of service on the network by managing when designing computer networks using the concept of virtual connections with bypass directions.  In many ways, the attainable level of quality of the services provided is determined at the stage of network design, when decisions was made regarding the subscriber capacity of stations, the capacity of bundles of trunk lines, the composition and volume of telecommunication services provided. Despite constant progress in the field of network technologies, the problem of determining the necessary amount of network resources and ensuring the quality of user service remains relevant. In this regard, this article discusses a broadband digital network with service integration, based on an asynchronous network in which an iterative method implemented. Here the flow distribution is determined by the route matrix, and the load distribution between the nodes of each pair of nodes made through the path tree obtained on the matrix of routes when calculating this pair. At the same time, an algorithm has been built for allow optimal allocation of channel resources between circuit switching and packet switching subnets within an asynchronous network.


Author(s):  
N. V. Apatova ◽  
A. I. Gaponov ◽  
O. Yu. Smirnova

The example of application of methods of computer representation of knowledge to the «Matrix» of the higher mathematics course, the authors examine the possibility of using elements of artificial intelligence, but do not propose an exhaustive algorithm for the construction of relevant systems, and based on the known thesis: «intellectual tasks no formal solution algorithm». Moreover, we implicitly proceed from the concept that when solving problems that require the participation of human intelligence, artificial intelligence can be only an auxiliary tool. Analysis of Russian and English sources has led to the conclusion that automated the process of proving mathematical theorems with the use of artificial intelligence (including neural networks) leads first-year students does not lead first-year students to the natural goal of teaching higher mathematics – » to teach logical reasoning. Usually the result comes down to «programmed» using the keyboard that, in certain circumstances, of course, is a very useful skill. But, unfortunately, the task «to teach the student to think, to reason logically and think outside the box», based on modern level of development of artificial intelligence (machine learning), according to the authors, is not yet resolved. Using the same knowledge base in an adequate format, and semantic networks allow at least allow you to at least get closer to the possibility of using artificial intelligence in the proof of theorems of higher mathematics. Because properly constructed semantic network will greatly assist as a teacher is in presenting the proof of the theorem, and demonstrate to the students a well-known logical connections and, we hope, will interest them in creating a new one. The above arguments determine the purpose of the proposed study is to build semantic networks for proof of mathematical theorems, and to solve the so-called «proof-based» tasks. In our opinion, the results of this study will not only contribute to streamlining the structure by the teacher and better understanding by students of the relevant sections of mathematics, but few will bring the solution of the problem of formation of artificial intelligence, based on the decision of «evidence-based» tasks of higher mathematics.


2021 ◽  
pp. 138-148
Author(s):  
O. Zherebko

The article deals with the features of the organizational provisions of forensic and expert activity of the bodies of the system of the Ministry Internal Affairs of Ukraine, the patterns associated with the appointment of a forensic examination, its conduct and the activities of the forensic departments of the bodies of the system the Ministry Internal Affairs. It is also developed recommendations for improving the forensic expert activity. Based on the results of the study, it was concluded that the ways to improve forensic examination should be: – increasing the level of technical and forensic support for the disclosure, investigation and prevention of crimes; – implementation of measures to increase the effectiveness of the participation of employees of expert services in the conduct of investigative actions and law enforcement intelligence operations; – improvement of research activities and the introduction into practice of new technical and forensic tools, forensic expert methods and methodologies; – conducting forensic records, analytical and organizational work based on the introduction of modern automated systems and technologies; – generalization and dissemination of best practices and analysis of expert practice; – improving the selection, training and placement of employees of expert subdivisions, strengthening of service and performance discipline; – intensification of interaction between the expert service of the Ministry of Internal Affairs with other divisions of the bodies of the system of the Ministry Internal Affairs, as well as with other law enforcement agencies, including at the interstate level.


Sign in / Sign up

Export Citation Format

Share Document