5-5 Visualization of Invisible Informations in Crime Detection and Identification

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification and Quantification of 5-Hydroxymethyl Furfural in Food Products

5-Hydroxymethylfurfural (5-HMF) is known as an indicator of quality deterioration in a wide range of foods. The current study covered 70 samples taken from domestically produced foods and drinks available on the Iranian markets (including honey, jam, fruit cakes tomato paste, ketchup, syrup, fruit juice, canned fruit, UHT milk, instant coffee and jelly powder). HMF levels were determined using ...

متن کامل

investigation of single-user and multi-user detection methods in mc-cdma systems and comparison of their performances

در این پایان نامه به بررسی روش های آشکارسازی در سیستم های mc-cdma می پردازیم. با توجه به ماهیت آشکارسازی در این سیستم ها، تکنیک های آشکارسازی را می توان به دو دسته ی اصلی تقسیم نمود: آشکارسازی سیگنال ارسالی یک کاربر مطلوب بدون در نظر گرفتن اطلاعاتی در مورد سایر کاربران تداخل کننده که از آن ها به عنوان آشکارساز های تک کاربره یاد می شود و همچنین آشکارسازی سیگنال ارسالی همه ی کاربران فعال موجود در...

identification and quantification of 5-hydroxymethyl furfural in food products

5-hydroxymethylfurfural (5-hmf) is known as an indicator of quality deterioration in a wide range of foods. the current study covered 70 samples taken from domestically produced foods and drinks available on the iranian markets (including honey, jam, fruit cakes tomato paste, ketchup, syrup, fruit juice, canned fruit, uht milk, instant coffee and jelly powder). hmf levels were determined using ...

متن کامل

IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification

Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...

متن کامل

O-5: Identification of Novel ImmunodominantEpididymal Sperm Proteins Using CombinatorialApproach

Background: Alteration in the protein signatures of functionally immature testicular spermatozoa occurs during their journey through the epididymis. This leads to acquisition of sperm domain specific functions essential for successful fertilization. Epididymal sperm proteins are preferred targets for immunocontraception as well as in elucidating the causes of infertility. The Background of the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of the Institute of Television Engineers of Japan

سال: 1976

ISSN: 1884-9644

DOI: 10.3169/itej1954.30.343