Tools and techniques for reviewing digital and documentary evidence

Author(s):  
Manbir Sandhu ◽  
Purnima, Anuradha Saini

Big data is a fast-growing technology that has the scope to mine huge amount of data to be used in various analytic applications. With large amount of data streaming in from a myriad of sources: social media, online transactions and ubiquity of smart devices, Big Data is practically garnering attention across all stakeholders from academics, banking, government, heath care, manufacturing and retail. Big Data refers to an enormous amount of data generated from disparate sources along with data analytic techniques to examine this voluminous data for predictive trends and patterns, to exploit new growth opportunities, to gain insight, to make informed decisions and optimize processes. Data-driven decision making is the essence of business establishments. The explosive growth of data is steering the business units to tap the potential of Big Data to achieve fueling growth and to achieve a cutting edge over their competitors. The overwhelming generation of data brings with it, its share of concerns. This paper discusses the concept of Big Data, its characteristics, the tools and techniques deployed by organizations to harness the power of Big Data and the daunting issues that hinder the adoption of Business Intelligence in Big Data strategies in organizations.


1995 ◽  
Vol 46 (1) ◽  
pp. 34-51 ◽  
Author(s):  
Ann Dean ◽  
Michael Taitt
Keyword(s):  

2001 ◽  
Vol 3 (1) ◽  
pp. 71-89 ◽  
Author(s):  
Yasin Dutton

The recent publication of the facsimile edition of MS Paris, Bibliothèque Nationale, Arabe 328a has allowed general access to what is probably one of the oldest, and most important, Qur'an fragments in Europe. The text is unvocalised, but the large number of folios (fifty-six) means that there are enough consonantal variants present to enable a positive identification of the reading represented, which turns out to be that of the Syrian Ibn cĀmir (d. 118/736). This, in combination with the early “Ḥijāzī” script, suggests (a) that this muṣḥaf was copied in Syria, and (b) that this was done some time during the first or early second century AH. In other words, what we have here is almost definitely a muṣḥaf according to the Syrian reading, copied in Syria, at the time when the caliphate had its seat in Syria, i.e. during the Umayyad period. Thus the identification of this particular reading helps in ascertaining the date and provenance of this particular manuscript, as it also fleshes out with documentary evidence the information given in the qirāↄāt literature about this reading.


Author(s):  
Zhigang Song ◽  
Jochonia Nxumalo ◽  
Manuel Villalobos ◽  
Sweta Pendyala

Abstract Pin leakage continues to be on the list of top yield detractors for microelectronics devices. It is simply manifested as elevated current with one pin or several pins during pin continuity test. Although many techniques are capable to globally localize the fault of pin leakage, root cause analysis and identification for it are still very challenging with today’s advanced failure analysis tools and techniques. It is because pin leakage can be caused by any type of defect, at any layer in the device and at any process step. This paper presents a case study to demonstrate how to combine multiple techniques to accurately identify the root cause of a pin leakage issue for a device manufactured using advanced technology node. The root cause was identified as under-etch issue during P+ implantation hard mask opening for ESD protection diode, causing P+ implantation missing, which was responsible for the nearly ohmic type pin leakage.


Sign in / Sign up

Export Citation Format

Share Document