Academic literature on the topic 'Forensic engineering - Data processing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Forensic engineering - Data processing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Forensic engineering - Data processing"

1

Prakash, Vijay, Alex Williams, Lalit Garg, Claudio Savaglio, and Seema Bawa. "Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems." Electronics 10, no. 11 (May 21, 2021): 1229. http://dx.doi.org/10.3390/electronics10111229.

Full text
Abstract:
In recent years, there has been a dramatic change in attitude towards computers and the use of computer resources in general. Cloud and Edge computing have emerged as the most widely used technologies, including fog computing and the Internet of Things (IoT). There are several benefits in exploiting Cloud and Edge computing paradigms, such as lower costs and higher efficiency. It provides data computation and storage where data are processed, enables better data control, faster understanding and actions, and continuous operation. However, though these benefits seem to be appealing, their effects on computer forensics are somewhat undesirable. The complexity of the Cloud and Edge environments and their key features present many technical challenges from multiple stakeholders. This paper seeks to establish an in-depth understanding of the impact of Cloud and Edge computing-based environmental factors. Software and hardware tools used in the digital forensic process, forensic methods for handling tampered sound files, hidden files, image files, or images with steganography, etc. The technical/legal challenges and the open design problems (such as distributed maintenance, multitasking and practicality) highlight the various challenges for the digital forensics process.
APA, Harvard, Vancouver, ISO, and other styles
2

Jean, Thilmany. "Working Backward." Mechanical Engineering 127, no. 06 (June 1, 2005): 36–38. http://dx.doi.org/10.1115/1.2005-jun-3.

Full text
Abstract:
This article reviews how reverse engineering is used in detecting and preserving. Engineers across many disciplines find reverse engineering an invaluable tool to discover and learn about a product’s structure and design. A good forensic engineer will glean relevant information through meticulous investigation and by taking a reverse-engineering approach. Texas Tech University, the National Park Service, and the Historic American Buildings Survey are now creating digital architectural drawings to detail the 120-year-old statue’s every curve, cranny, and dimension. They are doing this through reverse engineering. The university is capturing the statue's unique architecture with three-dimensional laser scanning technology tied to geometry processing software, which automatically generates an accurate digital model from the scan data. To help align the scans and to fix the holes, the team turned to technology that creates surface models from scanned data. The software is Geomagic Studio, from Raindrop Geomagic of Research Triangle Park, NC.
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Hyungchan, Sungbum Kim, Yeonghun Shin, Wooyeon Jo, Seokjun Lee, and Taeshik Shon. "Ext4 and XFS File System Forensic Framework Based on TSK." Electronics 10, no. 18 (September 20, 2021): 2310. http://dx.doi.org/10.3390/electronics10182310.

Full text
Abstract:
Recently, the number of Internet of Things (IoT) devices, such as artificial intelligence (AI) speakers and smartwatches, using a Linux-based file system has increased. Moreover, these devices are connected to the Internet and generate vast amounts of data. To efficiently manage these generated data and improve the processing speed, the function is improved by updating the file system version or using new file systems, such as an Extended File System (XFS), B-tree file system (Btrfs), or Flash-Friendly File System (F2FS). However, in the process of updating the existing file system, the metadata structure may be changed or the analysis of the newly released file system may be insufficient, making it impossible for existing commercial tools to extract and restore deleted files. In an actual forensic investigation, when deleted files become unrecoverable, important clues may be missed, making it difficult to identify the culprit. Accordingly, a framework for extracting and recovering files based on The Sleuth Kit (TSK) is proposed by deriving the metadata changed in Ext4 file system journal checksum v3 and XFS file system v5. Thereafter, by comparing the accuracy and recovery rate of the proposed framework with existing commercial tools using the experimental dataset, we conclude that sustained research on file systems should be conducted from the perspective of forensics.
APA, Harvard, Vancouver, ISO, and other styles
4

Chaves, Deisy, Eduardo Fidalgo, Enrique Alegre, Rocío Alaiz-Rodríguez, Francisco Jáñez-Martino, and George Azzopardi. "Assessment and Estimation of Face Detection Performance Based on Deep Learning for Forensic Applications." Sensors 20, no. 16 (August 11, 2020): 4491. http://dx.doi.org/10.3390/s20164491.

Full text
Abstract:
Face recognition is a valuable forensic tool for criminal investigators since it certainly helps in identifying individuals in scenarios of criminal activity like fugitives or child sexual abuse. It is, however, a very challenging task as it must be able to handle low-quality images of real world settings and fulfill real time requirements. Deep learning approaches for face detection have proven to be very successful but they require large computation power and processing time. In this work, we evaluate the speed–accuracy tradeoff of three popular deep-learning-based face detectors on the WIDER Face and UFDD data sets in several CPUs and GPUs. We also develop a regression model capable to estimate the performance, both in terms of processing time and accuracy. We expect this to become a very useful tool for the end user in forensic laboratories in order to estimate the performance for different face detection options. Experimental results showed that the best speed–accuracy tradeoff is achieved with images resized to 50% of the original size in GPUs and images resized to 25% of the original size in CPUs. Moreover, performance can be estimated using multiple linear regression models with a Mean Absolute Error (MAE) of 0.113, which is very promising for the forensic field.
APA, Harvard, Vancouver, ISO, and other styles
5

Salamh, Fahad E., Mohammad Meraj Mirza, and Umit Karabiyik. "UAV Forensic Analysis and Software Tools Assessment: DJI Phantom 4 and Matrice 210 as Case Studies." Electronics 10, no. 6 (March 19, 2021): 733. http://dx.doi.org/10.3390/electronics10060733.

Full text
Abstract:
Unmanned Aerial Vehicles (UAVs) also known as drones have created many challenges to the digital forensic field. These challenges are introduced in all processes of the digital forensic investigation (i.e., identification, preservation, examination, documentation, and reporting). From identification of evidence to reporting, there are several challenges caused by the data type, source of evidence, and multiple components that operate UAVs. In this paper, we comprehensively reviewed the current UAV forensic investigative techniques from several perspectives. Moreover, the contributions of this paper are as follows: (1) discovery of personal identifiable information, (2) test and evaluation of currently available forensic software tools, (3) discussion on data storage mechanism and evidence structure in two DJI UAV models (e.g., Phantom 4 and Matrice 210), and (4) exploration of flight trajectories recovered from UAVs using a three-dimensional (3D) visualization software. The aforementioned contributions aim to aid digital investigators to encounter challenges posed by UAVs. In addition, we apply our testing, evaluation, and analysis on the two selected models including DJI Matrice 210, which have not been presented in previous works.
APA, Harvard, Vancouver, ISO, and other styles
6

Keim, Yansi, Yung Han Yoon, and Umit Karabiyik. "Digital Forensics Analysis of Ubuntu Touch on PinePhone." Electronics 10, no. 3 (February 1, 2021): 343. http://dx.doi.org/10.3390/electronics10030343.

Full text
Abstract:
New smartphones made by small companies enter the technology market everyday. These new devices introduce new challenges for mobile forensic investigators as these devices end up becoming pertinent evidence during an investigation. One such device is the PinePhone from Pine Microsystems (Pine64). These new devices are sometimes also shipped with OSes that are developed by open source communities and are otherwise never seen by investigators. Ubuntu Touch is one of these OSes and is currently being developed for deployment on the PinePhone. There is little research behind both the device and OS on what methodology an investigator should follow to reliably and accurately extract data. This results in potentially flawed methodologies being used before any testing can occur and contributes to the backlog of devices that need to be processed. Therefore, in this paper, the first forensic analysis of the PinePhone device with Ubuntu Touch OS is performed using Autopsy, an open source tool, to establish a framework that can be used to examine and analyze devices running the Ubuntu Touch OS. The findings include analysis of artifacts that could impact user privacy and data security, organization structure of file storage, app storage, OS, etc. Moreover, locations within the device that stores call logs, SMS messages, images, and videos are reported. Interesting findings include forensic artifacts, which could be useful to investigators in understanding user activity and attribution. This research will provide a roadmap to the digital forensic investigators to efficiently and effectively conduct their investigations where they have Ubuntu Touch OS and/or PinePhone as the evidence source.
APA, Harvard, Vancouver, ISO, and other styles
7

Samsuryadi, Samsuryadi, Rudi Kurniawan, and Fatma Susilawati Mohamad. "Automated handwriting analysis based on pattern recognition: a survey." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (April 1, 2021): 196. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp196-206.

Full text
Abstract:
<span>Handwriting analysis has wide scopes include recruitment, medical diagnosis, forensic, psychology, and human-computer interaction. Computerized handwriting analysis makes it easy to recognize human personality and can help graphologists to understand and identify it. The features of handwriting use as input to classify a person’s personality traits. This paper discusses a pattern recognition point of view, in which different stages are described. The stages of study are data collection and pre-processing technique, feature extraction with associated personality characteristics, and the classification model. Therefore, the purpose of this paper is to present a review of the methods and their achievements used in various stages of a pattern recognition system. </span>
APA, Harvard, Vancouver, ISO, and other styles
8

Moldovan, Nicanor I., and Mauro Ferrari. "Prospects for Microtechnology and Nanotechnology in Bioengineering of Replacement Microvessels." Archives of Pathology & Laboratory Medicine 126, no. 3 (March 1, 2002): 320–24. http://dx.doi.org/10.5858/2002-126-0320-pfmani.

Full text
Abstract:
Abstract Context.—Due to its anticipated curative potential, therapeutic angiogenesis recently became a major preoccupation for the biomedical research community. Most of the related work reported to date employs either biochemical or genetic tools. Objective.—To identify opportunities for application of the current developments in microtechnology and nanotechnology to the field of therapeutic angiogenesis. Data Sources.—Survey of recent English-language literature on microvascular tissue engineering in the context of therapeutic angiogenesis. We include our results regarding the role played by microtopographical cues in the progression of angiogenesis, such as those produced during processing of the extracellular matrix by chronic inflammatory cells. Conclusion.—While notable accomplishments have been identified in the field of tissue engineering of larger vessels, reports on purposeful assembly of microvascular structures with the ability to be transferred in vivo by implantation are still scarce. Under these circumstances, we suggest the development of a new class of implantable biomedical microdevices, that is, “angiogenesis assist devices” (or “angiochips”), and we indicate some of their conceivable applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Amin, Muhammad Sadiq, Siddiqui Muhammad Yasir, and Hyunsik Ahn. "Recognition of Pashto Handwritten Characters Based on Deep Learning." Sensors 20, no. 20 (October 17, 2020): 5884. http://dx.doi.org/10.3390/s20205884.

Full text
Abstract:
Handwritten character recognition is increasingly important in a variety of automation fields, for example, authentication of bank signatures, identification of ZIP codes on letter addresses, and forensic evidence. Despite improved object recognition technologies, Pashto’s hand-written character recognition (PHCR) remains largely unsolved due to the presence of many enigmatic hand-written characters, enormously cursive Pashto characters, and lack of research attention. We propose a convolutional neural network (CNN) model for recognition of Pashto hand-written characters for the first time in an unrestricted environment. Firstly, a novel Pashto handwritten character data set, “Poha”, for 44 characters is constructed. For preprocessing, deep fusion image processing techniques and noise reduction for text optimization are applied. A CNN model optimized in the number of convolutional layers and their parameters outperformed common deep models in terms of accuracy. Moreover, a set of benchmark popular CNN models applied to Poha is evaluated and compared with the proposed model. The obtained experimental results show that the proposed model is superior to other models with test accuracy of 99.64 percent for PHCR. The results indicate that our model may be a strong candidate for handwritten character recognition and automated PHCR applications.
APA, Harvard, Vancouver, ISO, and other styles
10

Vandenabeele, Peter, and Jan Jehlička. "Mobile Raman spectroscopy in astrobiology research." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 372, no. 2030 (December 13, 2014): 20140202. http://dx.doi.org/10.1098/rsta.2014.0202.

Full text
Abstract:
Raman spectroscopy has proved to be a very useful technique in astrobiology research. Especially, working with mobile instrumentation during fieldwork can provide useful experiences in this field. In this work, we provide an overview of some important aspects of this research and, apart from defining different types of mobile Raman spectrometers, we highlight different reasons for this research. These include gathering experience and testing of mobile instruments, the selection of target molecules and to develop optimal data processing techniques for the identification of the spectra. We also identify the analytical techniques that it would be most appropriate to combine with Raman spectroscopy to maximize the obtained information and the synergy that exists with Raman spectroscopy research in other research areas, such as archaeometry and forensics.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Forensic engineering - Data processing"

1

Hargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling the plug’ is not ideal since volatile data is relevant to the investigation; one of these situations is when the machine under investigation is using encryption. If encrypted data is encountered on a live machine, a live investigation can be performed to preserve this evidence in a form that can be later analysed. However, there are a number of difficulties with using evidence obtained from live investigations that may cause the reliability of such evidence to be questioned. This research investigates whether digital evidence obtained from live investigations involving encryption can be considered to be reliable. To determine this, a means of assessing reliability is established, which involves evaluating digital evidence against a set of criteria; evidence should be authentic, accurate and complete. This research considers how traditional digital investigations satisfy these requirements and then determines the extent to which evidence from live investigations involving encryption can satisfy the same criteria. This research concludes that it is possible for live digital evidence to be considered to be reliable, but that reliability of digital evidence ultimately depends on the specific investigation and the importance of the decision being made. However, the research provides structured criteria that allow the reliability of digital evidence to be assessed, demonstrates the use of these criteria in the context of live digital investigations involving encryption, and shows the extent to which each can currently be met.
APA, Harvard, Vancouver, ISO, and other styles
2

Hargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.

Full text
Abstract:
The traditional approach to a digital investigation when a computer system is encountered in a running state is to remove the power, image the machine using a write blocker and then analyse the acquired image. This has the advantage of preserving the contents of the computer’s hard disk at that point in time. However, the disadvantage of this approach is that the preservation of the disk is at the expense of volatile data such as that stored in memory, which does not remain once the power is disconnected. There are an increasing number of situations where this traditional approach of ‘pulling the plug’ is not ideal since volatile data is relevant to the investigation; one of these situations is when the machine under investigation is using encryption. If encrypted data is encountered on a live machine, a live investigation can be performed to preserve this evidence in a form that can be later analysed. However, there are a number of difficulties with using evidence obtained from live investigations that may cause the reliability of such evidence to be questioned. This research investigates whether digital evidence obtained from live investigations involving encryption can be considered to be reliable. To determine this, a means of assessing reliability is established, which involves evaluating digital evidence against a set of criteria; evidence should be authentic, accurate and complete. This research considers how traditional digital investigations satisfy these requirements and then determines the extent to which evidence from live investigations involving encryption can satisfy the same criteria. This research concludes that it is possible for live digital evidence to be considered to be reliable, but that reliability of digital evidence ultimately depends on the specific investigation and the importance of the decision being made. However, the research provides structured criteria that allow the reliability of digital evidence to be assessed, demonstrates the use of these criteria in the context of live digital investigations involving encryption, and shows the extent to which each can currently be met.
APA, Harvard, Vancouver, ISO, and other styles
3

Hansson, Desiree Shaun. "A prototype fact sheet designed for the development of a forensic computerized information system at Valkenberg and Lentegeur Hospitals." Master's thesis, University of Cape Town, 1987. http://hdl.handle.net/11427/15865.

Full text
Abstract:
Includes bibliography.
The discussion in this paper centers around the development of a paper-and-pencil fact sheet for collecting and systematizing forensic case material. This paper-and-pencil device is the prototype fact sheet that will be used to collect the data to form a computerized, forensic information system. The system, known as FOCIS, the Forensic Computerized Information System, will serve the largest Forensic Unit in the Western Cape, at Valkenberg Hospital, and the new unit that is being developed at Lentegeur Hospital. FOCIS will comprise case material from all forensic referrals to these two hospitals, under the present law: Sections 77, 78 and 79 of the Criminal Procedure Act 51 of the 1st of July 1977. Additionally, FOCIS will develop dynamically, continuing to incorporate case material as referrals are made to these hospitals. The estimated 7500 cases that will constitute FOCIS by the time this project is completed, include all of the officially classified population groups of South Africa, i.e. the so-called 'black', 'coloured' and 'white' groups [POPULATION REGISTRATION ACT, 1982]. The prototype fact sheet has a schematic layout and uses a mixed-format for data collection, i.e. checklists, multiple choice answer-options and semi-structured narrative text.
APA, Harvard, Vancouver, ISO, and other styles
4

Fernandez, Noemi. "Statistical information processing for data classification." FIU Digital Commons, 1996. http://digitalcommons.fiu.edu/etd/3297.

Full text
Abstract:
This thesis introduces new algorithms for analysis and classification of multivariate data. Statistical approaches are devised for the objectives of data clustering, data classification and object recognition. An initial investigation begins with the application of fundamental pattern recognition principles. Where such fundamental principles meet their limitations, statistical and neural algorithms are integrated to augment the overall approach for an enhanced solution. This thesis provides a new dimension to the problem of classification of data as a result of the following developments: (1) application of algorithms for object classification and recognition; (2) integration of a neural network algorithm which determines the decision functions associated with the task of classification; (3) determination and use of the eigensystem using newly developed methods with the objectives of achieving optimized data clustering and data classification, and dynamic monitoring of time-varying data; and (4) use of the principal component transform to exploit the eigensystem in order to perform the important tasks of orientation-independent object recognition, and di mensionality reduction of the data such as to optimize the processing time without compromising accuracy in the analysis of this data.
APA, Harvard, Vancouver, ISO, and other styles
5

Chiu, Cheng-Jung. "Data processing in nanoscale profilometry." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/36677.

Full text
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 1995.
Includes bibliographical references (p. 176-177).
New developments on the nanoscale are taking place rapidly in many fields. Instrumentation used to measure and understand the geometry and property of the small scale structure is therefore essential. One of the most promising devices to head the measurement science into the nanoscale is the scanning probe microscope. A prototype of a nanoscale profilometer based on the scanning probe microscope has been built in the Laboratory for Manufacturing and Productivity at MIT. A sample is placed on a precision flip stage and different sides of the sample are scanned under the SPM to acquire its separate surface topography. To reconstruct the original three dimensional profile, many techniques like digital filtering, edge identification, and image matching are investigated and implemented in the computer programs to post process the data, and with greater emphasis placed on the nanoscale application. The important programming issues are addressed, too. Finally, this system's error sources are discussed and analyzed.
by Cheng-Jung Chiu.
M.S.
APA, Harvard, Vancouver, ISO, and other styles
6

Derksen, Timothy J. (Timothy John). "Processing of outliers and missing data in multivariate manufacturing data." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/38800.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1996.
Includes bibliographical references (leaf 64).
by Timothy J. Derksen.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
7

Nyström, Simon, and Joakim Lönnegren. "Processing data sources with big data frameworks." Thesis, KTH, Data- och elektroteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188204.

Full text
Abstract:
Big data is a concept that is expanding rapidly. As more and more data is generatedand garnered, there is an increasing need for efficient solutions that can be utilized to process all this data in attempts to gain value from it. The purpose of this thesis is to find an efficient way to quickly process a large number of relatively small files. More specifically, the purpose is to test two frameworks that can be used for processing big data. The frameworks that are tested against each other are Apache NiFi and Apache Storm. A method is devised in order to, firstly, construct a data flow and secondly, construct a method for testing the performance and scalability of the frameworks running this data flow. The results reveal that Apache Storm is faster than Apache NiFi, at the sort of task that was tested. As the number of nodes included in the tests went up, the performance did not always do the same. This indicates that adding more nodes to a big data processing pipeline, does not always result in a better performing setup and that, sometimes, other measures must be made to heighten the performance.
Big data är ett koncept som växer snabbt. När mer och mer data genereras och samlas in finns det ett ökande behov av effektiva lösningar som kan användas föratt behandla all denna data, i försök att utvinna värde från den. Syftet med detta examensarbete är att hitta ett effektivt sätt att snabbt behandla ett stort antal filer, av relativt liten storlek. Mer specifikt så är det för att testa två ramverk som kan användas vid big data-behandling. De två ramverken som testas mot varandra är Apache NiFi och Apache Storm. En metod beskrivs för att, för det första, konstruera ett dataflöde och, för det andra, konstruera en metod för att testa prestandan och skalbarheten av de ramverk som kör dataflödet. Resultaten avslöjar att Apache Storm är snabbare än NiFi, på den typen av test som gjordes. När antalet noder som var med i testerna ökades, så ökade inte alltid prestandan. Detta visar att en ökning av antalet noder, i en big data-behandlingskedja, inte alltid leder till bättre prestanda och att det ibland krävs andra åtgärder för att öka prestandan.
APA, Harvard, Vancouver, ISO, and other styles
8

徐順通 and Sung-thong Andrew Chee. "Computerisation in Hong Kong professional engineering firms." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1985. http://hub.hku.hk/bib/B31263124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Yi. "Data Management and Data Processing Support on Array-Based Scientific Data." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1436157356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bostanudin, Nurul Jihan Farhah. "Computational methods for processing ground penetrating radar data." Thesis, University of Portsmouth, 2013. https://researchportal.port.ac.uk/portal/en/theses/computational-methods-for-processing-ground-penetrating-radar-data(d519f94f-04eb-42af-a504-a4c4275d51ae).html.

Full text
Abstract:
The aim of this work was to investigate signal processing and analysis techniques for Ground Penetrating Radar (GPR) and its use in civil engineering and construction industry. GPR is the general term applied to techniques which employ radio waves, typically in the Mega Hertz and Giga Hertz range, to map structures and features buried in the ground or in manmade structures. GPR measurements can suffer from large amount of noise. This is primarily caused by interference from other radio-wave-emitting devices (e.g., cell phones, radios, etc.) that are present in the surrounding area of the GPR system during data collection. In addition to noise, presence of clutter – reflections from other non-target objects buried underground in the vicinity of the target can make GPR measurement difficult to understand and interpret, even for the skilled human, GPR analysts. This thesis is concerned with the improvements and processes that can be applied to GPR data in order to enhance target detection and characterisation process particularly with multivariate signal processing techniques. Those primarily include Principal Component Analysis (PCA) and Independent Component Analysis (ICA). Both techniques have been investigated, implemented and compared regarding their abilities to separate the target originating signals from the noise and clutter type signals present in the data. Combination of PCA and ICA (SVDPICA) and two-dimensional PCA (2DPCA) are the specific approaches adopted and further developed in this work. Ability of those methods to reduce the amount of clutter and unwanted signals present in GPR data have been investigated and reported in this thesis, suggesting that their use in automated analysis of GPR images is a possibility. Further analysis carried out in this work concentrated on analysing the performance of developed multivariate signal processing techniques and at the same time investigating the possibility of identifying and characterising the features of interest in pre-processed GPR images. The driving idea behind this part of work was to extract the resonant modes present in the individual traces of each GPR image and to use properties of those poles to characterise target. Three related but different methods have been implemented and applied in this work – Extended Prony, Linear Prediction Singular Value Decomposition and Matrix Pencil methods. In addition to these approaches, PCA technique has been used to reduce dimensionality of extracted traces and to compare signals measured in various experimental setups. Performance analysis shows that Matrix Pencil offers the best results.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Forensic engineering - Data processing"

1

Sencar, Husrev T. Digital Image Forensics: There is More to a Picture than Meets the Eye. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Shu-Ching, and Mei-Ling Shyu. Multimedia data engineering applications and processing. Hershey, PA: Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

O'Reilly, W. Patrick. Computer aided electronic engineering. Berkshire, England: Van Nostrand Reinhold, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Essential forensic biology. 2nd ed. Chichester, West Sussex: J. Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hanna, Owen T. Computational methods in chemical engineering. Englewood Cliffs, N.J: Prentice Hall PTR, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Computer methods in chemical engineering. Boca Raton, FL: Taylor & Francis, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nelson, Wayne. Applied life data analysis. Hoboken, NJ: Wiley-Interscience, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nelson, Wayne. Applied Life Data Analysis. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gargiulo, Gaetano D., and Alistair McEwan. Advanced biomedical engineering. Rijeka, Croatia: InTech Open Access Publisher, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Computational methods in physics and engineering. Englewood Cliffs, N.J: Prentice Hall, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Forensic engineering - Data processing"

1

Leucci, Giovanni. "Forensic Geophysical Data Processing and Interpretation." In Advances in Geophysical Methods Applied to Forensic Investigations, 121–219. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46242-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Povar, Digambar, and V. K. Bhadran. "Forensic Data Carving." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 137–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19513-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Berns, Karsten, Alexander Köpper, and Bernd Schürmann. "Sensor Data Processing." In Lecture Notes in Electrical Engineering, 227–53. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-65157-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Godse, Jay. "Reverse-Engineering Complex Solutions." In Ruby Data Processing, 89–96. Berkeley, CA: Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-3474-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lovanshi, Mayank, and Pratosh Bansal. "Comparative Study of Digital Forensic Tools." In Data, Engineering and Applications, 195–204. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6351-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Day, Peter. "Forensic Geotechnical Engineering Investigations: Data Collection." In Developments in Geotechnical Engineering, 95–102. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2377-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Awange, Joseph L. "Data Processing and Adjustment." In Environmental Science and Engineering, 91–107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-540-88256-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gupchup, Nirneeta, and Nishchol Mishra. "A Systematic Survey on Mobile Forensic Tools Used for Forensic Analysis of Android-Based Social Networking Applications." In Data, Engineering and Applications, 205–15. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6351-1_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

López-Monroy, A. Pastor, Hugo Jair Escalante, Manuel Montes-y-Gómez, and Xavier Baró. "Forensic Analysis Recognition." In Engineering Data-Driven Adaptive Trust-based e-Assessment Systems, 1–18. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-29326-0_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Economou, Nikos, Antonis Vafidis, Francesco Benedetto, and Amir M. Alani. "GPR Data Processing Techniques." In Civil Engineering Applications of Ground Penetrating Radar, 281–97. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-04813-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Forensic engineering - Data processing"

1

Verhulst, Stewart M., J. Daniel Bosley, and Amanda K. Talbott. "Hail Sizing: A Comparison of On-Site Data with Weather Data." In Eighth Congress on Forensic Engineering. Reston, VA: American Society of Civil Engineers, 2018. http://dx.doi.org/10.1061/9780784482018.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ratna Divya, Y., C. Natarajan, and A. Rajaraman. "Uncertainty Information Processing in Repair and Rehabilitation." In Fifth Forensic Engineering Congress. Reston, VA: American Society of Civil Engineers, 2009. http://dx.doi.org/10.1061/41082(362)61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kot, A. "Watermarking, Data Hiding and Image Forensic." In 2005 5th International Conference on Information Communications and Signal Processing. IEEE, 2005. http://dx.doi.org/10.1109/icics.2005.1688987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Salunkhe, Priyanka, Smita Bharne, and Puja Padiya. "Data analysis of file forensic investigation." In 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016. http://dx.doi.org/10.1109/scopes.2016.7955854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meenu, Natarajan, Rajaram, and Chidambaram Thanu Natarajan. "Visual Information Processing for Status Assessment in Bridges." In Sixth Congress on Forensic Engineering. Reston, VA: American Society of Civil Engineers, 2012. http://dx.doi.org/10.1061/9780784412640.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rajaraman, A., and C. Natarajan. "Visual Information Processing for Forensic Studies in Engineering." In Indo-U.S. Forensic Engineering Workshop. Reston, VA: American Society of Civil Engineers, 2010. http://dx.doi.org/10.1061/41149(393)12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Karanci, E., and R. Nagata. "A New Method for Managing and Presenting Façade Investigation Data." In Sixth Congress on Forensic Engineering. Reston, VA: American Society of Civil Engineers, 2012. http://dx.doi.org/10.1061/9780784412640.091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wagner, James. "Auditing DBMSes through Forensic Analysis." In 2018 IEEE 34th International Conference on Data Engineering (ICDE). IEEE, 2018. http://dx.doi.org/10.1109/icde.2018.00219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stoykova, Radina, and Katrin Franke. "Standard Representation for Digital Forensic Processing." In 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE, 2020. http://dx.doi.org/10.1109/sadfe51007.2020.00014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jhagdambi, Roodredevi, and Biao Zhong. "Using Big Data in Early Warning System of Flash Floods in Mauritius." In Eighth Congress on Forensic Engineering. Reston, VA: American Society of Civil Engineers, 2018. http://dx.doi.org/10.1061/9780784482018.080.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Forensic engineering - Data processing"

1

Hall, Candice, and Robert Jensen. Utilizing data from the NOAA National Data Buoy Center. Engineer Research and Development Center (U.S.), March 2021. http://dx.doi.org/10.21079/11681/40059.

Full text
Abstract:
This Coastal and Hydraulics Engineering Technical Note (CHETN) guides users through the quality control (QC) and processing steps that are necessary when using archived U.S. National Oceanic and Atmospheric Administration (NOAA) National Data Buoy Center (NDBC) wave and meteorological data. This CHETN summarizes methodologies to geographically clean and QC NDBC measurement data for use by the U.S. Army Corps of Engineers (USACE) user community.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography