首页 > 最新文献

2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)最新文献

英文 中文
Ellipsoidal support vector data description in kernel PCA subspace 核主成分分析子空间中的椭球支持向量数据描述
Kunzhe Wang, Huaitie Xiao, Yaowen Fu
Support vector data description (SVDD) is a popular kernel method for novelty detection, which constructs a spherical boundary around the normal class with minimum volume. Sphere being a special case of ellipsoid, it thus will be more general to extend classical SVDD to ellipsoidal boundary and better description ability can be anticipated. In this paper, we propose an ellipsoidal SVDD (ESVDD) by incorporating the ellipsoid estimation into kernel principal component analysis (kernel PCA). A minimum volume enclosing ellipsoid (MVEE) is constructed around a dataset in the kernel PCA subspace which can be solved through convex optimization. The outlyingness for new object is measured by the Mahalanobis distance. Experiments on artificial dataset validate the effectiveness of our method.
支持向量数据描述(SVDD)是一种流行的新颖性检测核方法,它在最小体积的正常类周围构造一个球形边界。球是椭球体的一种特例,因此将经典奇异向量分解扩展到椭球体边界将具有更一般的通用性,并具有更好的描述能力。本文将椭球估计与核主成分分析(kernel principal component analysis, PCA)相结合,提出了椭球SVDD (ESVDD)。在核主成分分析子空间中,围绕数据集构造了一个最小体积封闭椭球(MVEE),该椭球可以通过凸优化来求解。新天体的距离是用马氏距离来测量的。在人工数据集上的实验验证了该方法的有效性。
{"title":"Ellipsoidal support vector data description in kernel PCA subspace","authors":"Kunzhe Wang, Huaitie Xiao, Yaowen Fu","doi":"10.1109/DIPDMWC.2016.7529356","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529356","url":null,"abstract":"Support vector data description (SVDD) is a popular kernel method for novelty detection, which constructs a spherical boundary around the normal class with minimum volume. Sphere being a special case of ellipsoid, it thus will be more general to extend classical SVDD to ellipsoidal boundary and better description ability can be anticipated. In this paper, we propose an ellipsoidal SVDD (ESVDD) by incorporating the ellipsoid estimation into kernel principal component analysis (kernel PCA). A minimum volume enclosing ellipsoid (MVEE) is constructed around a dataset in the kernel PCA subspace which can be solved through convex optimization. The outlyingness for new object is measured by the Mahalanobis distance. Experiments on artificial dataset validate the effectiveness of our method.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125125517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
High-speed smoothing filter in the Residue Number System 余数系统中的高速平滑滤波
N. Chervyakov, P. Lyakhov, A. S. Ionisyan, M. Valueva
In this paper we propose a new architecture of a smoothing filter in the RNS. The problem of computationally complex division operation performing is solved by replacing this operation by division with the remainder. This makes it possible to replace the division by subtraction and a multiplication in the RNS when using RNS modulo as a divisor. Simulation of smoothing filter hardware implementation showed an 12,5% increase the processing speed by using the proposed architecture in comparison with smoothing filter functioning in BNS and 46,7% increase the processing speed in comparison with known smoothing filter architecture in RNS. Besides, hardware costs for the implementation of the proposed architecture on average 25% less in comparison with known smoothing filter architecture in RNS.
本文提出了一种新的RNS平滑滤波器结构。计算复杂的除法运算执行问题是通过用余数代替该运算来解决的。这使得当使用RNS模作为除数时,可以用RNS中的减法和乘法来代替除法。仿真结果表明,与BNS中的平滑滤波器相比,采用该滤波结构的硬件处理速度提高了12.5%,与RNS中的已知平滑滤波器结构相比,处理速度提高了46.7%。此外,与RNS中已知的平滑滤波器结构相比,实现该结构的硬件成本平均降低了25%。
{"title":"High-speed smoothing filter in the Residue Number System","authors":"N. Chervyakov, P. Lyakhov, A. S. Ionisyan, M. Valueva","doi":"10.1109/DIPDMWC.2016.7529375","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529375","url":null,"abstract":"In this paper we propose a new architecture of a smoothing filter in the RNS. The problem of computationally complex division operation performing is solved by replacing this operation by division with the remainder. This makes it possible to replace the division by subtraction and a multiplication in the RNS when using RNS modulo as a divisor. Simulation of smoothing filter hardware implementation showed an 12,5% increase the processing speed by using the proposed architecture in comparison with smoothing filter functioning in BNS and 46,7% increase the processing speed in comparison with known smoothing filter architecture in RNS. Besides, hardware costs for the implementation of the proposed architecture on average 25% less in comparison with known smoothing filter architecture in RNS.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131205683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Android applications and security breach 安卓应用和安全漏洞
Diana Gabriela Noemí Benítez-Mejía, G. Sánchez-Pérez, L. K. Toscano-Medina
The evolution of the Technology and its use in the daily life and business has made that the people trust in mobile devices to perform important activities. Hackers have focus in them due to the information they can get. In recent years, the growth of malware towards mobile devices has been outstanding. In this paper we present mobile threats and some of the main attack vectors that hackers use to steal information. Taking into account that applications are necessary in Android, we perform the analysis of a sample of the Remote Access Trojan called Dendroid, due to it is easy to found this kind of Trojans in Android applications. Also, as an example of how dangerous for the privacy of the users are the applications that request more permissions than those they need to run; ending with the encouragement to developers and researches to find alternatives to solve this security breach in Android.
技术的发展及其在日常生活和商业中的应用使得人们信任移动设备来执行重要的活动。黑客们之所以关注他们,是因为他们可以获得信息。近年来,针对移动设备的恶意软件增长非常明显。在本文中,我们介绍了移动威胁和黑客用来窃取信息的一些主要攻击向量。考虑到应用程序在Android中是必需的,我们对一个名为Dendroid的远程访问木马样本进行了分析,因为在Android应用程序中很容易发现这类木马。此外,作为一个对用户隐私有多危险的例子是,应用程序请求的权限比它们需要运行的权限多;最后鼓励开发人员和研究人员寻找解决Android安全漏洞的替代方案。
{"title":"Android applications and security breach","authors":"Diana Gabriela Noemí Benítez-Mejía, G. Sánchez-Pérez, L. K. Toscano-Medina","doi":"10.1109/DIPDMWC.2016.7529383","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529383","url":null,"abstract":"The evolution of the Technology and its use in the daily life and business has made that the people trust in mobile devices to perform important activities. Hackers have focus in them due to the information they can get. In recent years, the growth of malware towards mobile devices has been outstanding. In this paper we present mobile threats and some of the main attack vectors that hackers use to steal information. Taking into account that applications are necessary in Android, we perform the analysis of a sample of the Remote Access Trojan called Dendroid, due to it is easy to found this kind of Trojans in Android applications. Also, as an example of how dangerous for the privacy of the users are the applications that request more permissions than those they need to run; ending with the encouragement to developers and researches to find alternatives to solve this security breach in Android.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121772945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Information Technologists that were desired by enterprises in Thailand 泰国企业所需要的信息技术人员
Narungsun Wilaisakoolyong
In 2016, Thailand had integrated with the ASEAN Economic Community (AEC). This causes technological competition increasing. Information Technologists are particularly important in this competition. The main aim of this research presents the essential features and characteristics of Information Technologists that were desired by the enterprises. Population of the study were the enterprises which run a business in Thailand. Samples of the research were 139 enterprises which were random selected. The samples comprise of 83 Thai enterprises and 56 foreign enterprises. The statistics employed for analyzing the data were mean, standard deviation and independent t-test. The research results show that enterprises need Information Technologists who have four essential features. These are Knowledge and Abilities' Characteristics, Management's Characteristics, Information Technology Skill's Licenses, Ethics and Moral's Characteristics. If Information Technologists have these features and characteristics, they will be desired by enterprises. Entrepreneurs are confident that they can work more efficiently.
2016年,泰国加入东盟经济共同体。这导致技术竞争加剧。信息技术专家在这场竞争中尤为重要。本研究的主要目的是提出企业所需要的信息技术人员的基本特征和特征。研究对象是在泰国经营业务的企业。研究样本为随机抽取的139家企业。样本包括83家泰国企业和56家外国企业。数据分析采用的统计量为均数、标准差和独立t检验。研究结果表明,企业需要具备四个基本特征的信息技术人员。知识能力特征、管理能力特征、信息技术技能特征、伦理道德特征。如果信息技术人员具有这些特点和特点,他们将是企业所需要的。企业家们相信他们可以更有效地工作。
{"title":"The Information Technologists that were desired by enterprises in Thailand","authors":"Narungsun Wilaisakoolyong","doi":"10.1109/DIPDMWC.2016.7529405","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529405","url":null,"abstract":"In 2016, Thailand had integrated with the ASEAN Economic Community (AEC). This causes technological competition increasing. Information Technologists are particularly important in this competition. The main aim of this research presents the essential features and characteristics of Information Technologists that were desired by the enterprises. Population of the study were the enterprises which run a business in Thailand. Samples of the research were 139 enterprises which were random selected. The samples comprise of 83 Thai enterprises and 56 foreign enterprises. The statistics employed for analyzing the data were mean, standard deviation and independent t-test. The research results show that enterprises need Information Technologists who have four essential features. These are Knowledge and Abilities' Characteristics, Management's Characteristics, Information Technology Skill's Licenses, Ethics and Moral's Characteristics. If Information Technologists have these features and characteristics, they will be desired by enterprises. Entrepreneurs are confident that they can work more efficiently.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Problem of identifying destructive informational influence in social networks 识别社交网络中破坏性信息影响的问题
E. Okhapkina, A. Tarasov, V. Okhapkin
The article deals with the task of identifying the elements of the information influence in messages of social networks. Structural-logical scheme of solving the problem is described. We consider the cognitive aspects and approach to building patterns of network messages that contain the elements of information influence. It is presented scheme of weighting terms in network messages and the method of calculating the degree of proximity of the analyzed messages and patterns.
本文探讨了识别社交网络信息影响因素的任务。给出了解决该问题的结构逻辑方案。我们考虑认知方面和方法来构建包含信息影响元素的网络消息模式。提出了网络消息中加权项的方案,以及被分析消息和模式的接近度的计算方法。
{"title":"Problem of identifying destructive informational influence in social networks","authors":"E. Okhapkina, A. Tarasov, V. Okhapkin","doi":"10.1109/DIPDMWC.2016.7529362","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529362","url":null,"abstract":"The article deals with the task of identifying the elements of the information influence in messages of social networks. Structural-logical scheme of solving the problem is described. We consider the cognitive aspects and approach to building patterns of network messages that contain the elements of information influence. It is presented scheme of weighting terms in network messages and the method of calculating the degree of proximity of the analyzed messages and patterns.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125012077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
LionBEAR: A location based energy aware routing scheme in DTNs LionBEAR:一种基于位置的ddn能量感知路由方案
Nabanita Das, A. Roy, S. DasBit
In Delay-Tolerant Networks (DTNs), data is forwarded opportunistically upon contact because of intermittent connectivity and network sparsity. To address the problem of selecting appropriate relay nodes for data forwarding, nowadays location information of the nodes is used in the design of DTN routing schemes. But the existing schemes lack in considering energy-constraints of the nodes. In this paper, we propose a location-based energy-aware routing scheme to deliver data to the destination. The proposed scheme selects relays for data delivery based on the location as well as on the residual energy of the DTN nodes. Exhaustive simulation is performed using ONE simulator to evaluate the comparative performance of our proposed scheme with an existing state-of-the-art competing scheme. We claim that our scheme achieves higher delivery ratio and longer network lifetime in terms of average residual energy compared to the competing scheme. Our claim is validated through qualitative and quantitative performance analyses.
在容忍延迟网络(DTNs)中,由于间歇性连接和网络稀疏性,数据在接触时被随机转发。为了解决中继节点的选择问题,目前在DTN路由方案设计中采用了中继节点的位置信息。但是现有的方案缺乏对节点能量约束的考虑。在本文中,我们提出了一种基于位置的能量感知路由方案来将数据传输到目的地。该方案根据DTN节点的位置和剩余能量选择中继进行数据传输。使用ONE模拟器进行详尽的仿真,以评估我们提出的方案与现有最先进的竞争方案的比较性能。我们声称,与竞争方案相比,我们的方案在平均剩余能量方面实现了更高的交付率和更长的网络寿命。我们的主张是通过定性和定量的性能分析验证。
{"title":"LionBEAR: A location based energy aware routing scheme in DTNs","authors":"Nabanita Das, A. Roy, S. DasBit","doi":"10.1109/DIPDMWC.2016.7529367","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529367","url":null,"abstract":"In Delay-Tolerant Networks (DTNs), data is forwarded opportunistically upon contact because of intermittent connectivity and network sparsity. To address the problem of selecting appropriate relay nodes for data forwarding, nowadays location information of the nodes is used in the design of DTN routing schemes. But the existing schemes lack in considering energy-constraints of the nodes. In this paper, we propose a location-based energy-aware routing scheme to deliver data to the destination. The proposed scheme selects relays for data delivery based on the location as well as on the residual energy of the DTN nodes. Exhaustive simulation is performed using ONE simulator to evaluate the comparative performance of our proposed scheme with an existing state-of-the-art competing scheme. We claim that our scheme achieves higher delivery ratio and longer network lifetime in terms of average residual energy compared to the competing scheme. Our claim is validated through qualitative and quantitative performance analyses.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128659350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High-dimensional neural-network artificial intelligence capable of quick learning to recognize a new smell, and gradually expanding the database 高维神经网络人工智能能够快速学习识别新的气味,并逐步扩大数据库
A. I. Ivanov, V. Kulagin, Y. M. Kuznetsov, G. M. Chulkova, A. Ivannikov
We demonstrate that classical quadratic forms are not able to solve the problem of recognizing high-dimensional images. The “deep” Galushkin-Hinton neural networks can solve the problem of high-dimensional image recognition, but their training has exponential computational complexity. It is technically impossible to train and retrain a “deep” neural network rapidly. For mobile “artificial nose” systems we proposed to employ a number of “wide” neural networks trained in accordance with (GOST R 52633.5-2011). This standardized learning algorithm has a linear computational complexity, i.e. for each new smell image a time of about 0.3 seconds is sufficient for creating and training a new neural network with 2024 inputs and 256 outputs. This leads to the possibility of the rapid training of the artificial intelligence “artificial nose” and a gradual expansion of its database consisting of 10 000 or more trained artificial neural networks.
我们证明了经典的二次型不能解决高维图像的识别问题。“深度”Galushkin-Hinton神经网络可以解决高维图像识别问题,但其训练具有指数级的计算复杂度。从技术上讲,快速训练和再训练一个“深度”神经网络是不可能的。对于移动“人造鼻子”系统,我们建议采用许多根据(GOST R 52633.5-2011)训练的“宽”神经网络。这种标准化的学习算法具有线性计算复杂度,即对于每个新的气味图像,大约0.3秒的时间足以创建和训练一个具有2024个输入和256个输出的新神经网络。这使得人工智能“人工鼻子”的快速训练成为可能,并逐渐扩大其由10000个或更多训练过的人工神经网络组成的数据库。
{"title":"High-dimensional neural-network artificial intelligence capable of quick learning to recognize a new smell, and gradually expanding the database","authors":"A. I. Ivanov, V. Kulagin, Y. M. Kuznetsov, G. M. Chulkova, A. Ivannikov","doi":"10.1109/DIPDMWC.2016.7529413","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529413","url":null,"abstract":"We demonstrate that classical quadratic forms are not able to solve the problem of recognizing high-dimensional images. The “deep” Galushkin-Hinton neural networks can solve the problem of high-dimensional image recognition, but their training has exponential computational complexity. It is technically impossible to train and retrain a “deep” neural network rapidly. For mobile “artificial nose” systems we proposed to employ a number of “wide” neural networks trained in accordance with (GOST R 52633.5-2011). This standardized learning algorithm has a linear computational complexity, i.e. for each new smell image a time of about 0.3 seconds is sufficient for creating and training a new neural network with 2024 inputs and 256 outputs. This leads to the possibility of the rapid training of the artificial intelligence “artificial nose” and a gradual expansion of its database consisting of 10 000 or more trained artificial neural networks.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127294770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Current issues in education as pertaining to the realm of e-commerce legal protection 当前教育中涉及电子商务法律保护领域的问题
S. Konev, A. S. Kulagin, N. V. Morozov, I. Levakin
The authors analyze some major problems of developing competent human resources, first of all legal experts, in the electronic commerce (e-commerce) legal protection sphere. To date, the educative process has been evolving mainly around technically- or economically-oriented academic programmes; however, in actual practice there is a strong demand for an integrative approach to education that implies the acquisition of comprehensive knowledge including legal knowledge among others. Starting out from such courses already having been taught by NRNU MEPhI for years as “Technical aspects of information security”, “Legal regulation of e-document flow and making use of digital signatures” as well as several others, the authors suggest that such kind of a comprehensive approach be applied to the specialist training in the sphere of e-commerce legal protection.
本文分析了电子商务法律保护领域培养合格人才的几个主要问题,首先是法律专家。迄今为止,教育进程主要围绕着以技术或经济为导向的学术方案发展;然而,在实际实践中,强烈需要一种综合的教育方法,这意味着获得包括法律知识在内的综合知识。作者从“信息安全的技术方面”、“电子文件流动的法律规制和数字签名的使用”等课程入手,建议将这种综合方法应用于电子商务法律保护领域的专业培训。
{"title":"Current issues in education as pertaining to the realm of e-commerce legal protection","authors":"S. Konev, A. S. Kulagin, N. V. Morozov, I. Levakin","doi":"10.1109/DIPDMWC.2016.7529387","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529387","url":null,"abstract":"The authors analyze some major problems of developing competent human resources, first of all legal experts, in the electronic commerce (e-commerce) legal protection sphere. To date, the educative process has been evolving mainly around technically- or economically-oriented academic programmes; however, in actual practice there is a strong demand for an integrative approach to education that implies the acquisition of comprehensive knowledge including legal knowledge among others. Starting out from such courses already having been taught by NRNU MEPhI for years as “Technical aspects of information security”, “Legal regulation of e-document flow and making use of digital signatures” as well as several others, the authors suggest that such kind of a comprehensive approach be applied to the specialist training in the sphere of e-commerce legal protection.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133543976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic handwriting examination and human factors: Improving the practice through automation and expert training 法医笔迹鉴定与人为因素:通过自动化和专家培训改进实践
S. Kulik, D. Nikonets
Forensic handwriting examination is one of the most sophisticated and controversial in terms of the results objectivity. One reason for this is that the result of the examination is affected by the subjectivity of the expert. The article suggests a number of methods to reduce the impact of human factors on the results of handwriting examination. First of all, it is the development of quantitative techniques for handwriting analysis, allowing obtaining scientifically grounded results of the study. As an example of those techniques, technique for identification (verification) of the writer of the handwritten text is described. In addition, as a way to reduce the influence of the human factor, it is suggested to pay attention to improving the skills of existing experts and training of new experts for forensic handwriting examination. These problems can be partly solved by using presented automated workplace of forensic handwriting expert “FHWE v.1.0”.
法医笔迹鉴定是鉴定结果客观性最复杂、争议最大的鉴定方法之一。造成这种情况的一个原因是,检查结果受到专家主观性的影响。文章提出了一些减少人为因素对笔迹检验结果影响的方法。首先,它是笔迹分析定量技术的发展,允许获得科学的研究结果。作为这些技术的一个例子,描述了识别(验证)手写文本作者的技术。此外,作为减少人为因素影响的一种方式,建议注意提高现有法医笔迹鉴定专家的技能,培养新的法医笔迹鉴定专家。这些问题可以部分地通过使用法医笔迹专家“FHWE v.1.0”的自动化工作场所来解决。
{"title":"Forensic handwriting examination and human factors: Improving the practice through automation and expert training","authors":"S. Kulik, D. Nikonets","doi":"10.1109/DIPDMWC.2016.7529393","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529393","url":null,"abstract":"Forensic handwriting examination is one of the most sophisticated and controversial in terms of the results objectivity. One reason for this is that the result of the examination is affected by the subjectivity of the expert. The article suggests a number of methods to reduce the impact of human factors on the results of handwriting examination. First of all, it is the development of quantitative techniques for handwriting analysis, allowing obtaining scientifically grounded results of the study. As an example of those techniques, technique for identification (verification) of the writer of the handwritten text is described. In addition, as a way to reduce the influence of the human factor, it is suggested to pay attention to improving the skills of existing experts and training of new experts for forensic handwriting examination. These problems can be partly solved by using presented automated workplace of forensic handwriting expert “FHWE v.1.0”.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130719351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A proposal of educating Brazilian police officers for cybercrime investigation & prosecution 一项教育巴西警察调查和起诉网络犯罪的建议
Ilane Karise Barbosa Cunha, Ahmed Patel, Andre Luiz Moura dos Santos, J. Celestino
With the exponential growth of information communication technology (ICT), cybercrimes have grown equally, culminating in investigation, solving such crimes and prosecuting the criminals. This article presents a proposal for the education, training and certified qualification of Brazilian police officers in order to prepare them so that they can be as knowledgeable, reliable, efficient and effective as possible. The proposal presents two types of training and qualification: the first, police officers whose primary focus is not cybercrime per se, but who as first responders are likely to encounter ICT activities as part of their work in fighting cybercrime; and the second, police officers who are involved in cybercrime investigations but expected to be classified as specialists. The proposal places strong emphasis on practical hands-on exercises, crime-scene hypothetical laboratories scenarios, actual and mock case studies and workshops to highly skilled Brazilian police officers as world class investigators. To meet this target, the proposal includes an outline of the proposed syllabus and laboratory practical sessions for each level of training to evolve specialist investigators.
随着信息通信技术(ICT)的指数级增长,网络犯罪也同样增长,最终导致调查,解决此类犯罪并起诉罪犯。本文提出了一项关于巴西警察的教育、培训和认证资格的建议,以便培养他们,使他们能够尽可能地知识渊博、可靠、高效和有效。该提案提出了两种类型的培训和资格:第一种,警察的主要重点不是网络犯罪本身,而是作为第一响应者,他们在打击网络犯罪的工作中可能会遇到信息通信技术活动;第二种是参与网络犯罪调查的警察,但预计会被归类为专家。该提案非常强调实际的动手练习、犯罪现场假设实验室场景、实际和模拟案例研究以及将高技能的巴西警察作为世界级调查人员的讲习班。为了实现这一目标,该建议包括建议的教学大纲和实验室实践课程的大纲,以培养每一级的专家调查员。
{"title":"A proposal of educating Brazilian police officers for cybercrime investigation & prosecution","authors":"Ilane Karise Barbosa Cunha, Ahmed Patel, Andre Luiz Moura dos Santos, J. Celestino","doi":"10.1109/DIPDMWC.2016.7529386","DOIUrl":"https://doi.org/10.1109/DIPDMWC.2016.7529386","url":null,"abstract":"With the exponential growth of information communication technology (ICT), cybercrimes have grown equally, culminating in investigation, solving such crimes and prosecuting the criminals. This article presents a proposal for the education, training and certified qualification of Brazilian police officers in order to prepare them so that they can be as knowledgeable, reliable, efficient and effective as possible. The proposal presents two types of training and qualification: the first, police officers whose primary focus is not cybercrime per se, but who as first responders are likely to encounter ICT activities as part of their work in fighting cybercrime; and the second, police officers who are involved in cybercrime investigations but expected to be classified as specialists. The proposal places strong emphasis on practical hands-on exercises, crime-scene hypothetical laboratories scenarios, actual and mock case studies and workshops to highly skilled Brazilian police officers as world class investigators. To meet this target, the proposal includes an outline of the proposed syllabus and laboratory practical sessions for each level of training to evolve specialist investigators.","PeriodicalId":298218,"journal":{"name":"2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128172050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1