Nano fingerprints
نویسندگان
چکیده
منابع مشابه
Nano-scale composition of commercial white powders for development of latent fingerprints on adhesives.
Titanium dioxide based powders are regularly used in the development of latent fingerprints on dark surfaces. For analysis of prints on adhesive tapes, the titanium dioxide can be suspended in a surfactant and used in the form of a powder suspension. Commercially available products, whilst having nominally similar composition, show varying levels of effectiveness of print development, with some...
متن کاملFingerprints Theorems
We prove that the scale map of the .zero-crossings of almost all signals filtered by a gaussian of variable size determines the signal uniquely, up to a constant scaling. Exceptions are signals that are antisymmetric about all their zeros (for instance infinitely periodic gratings). Our proof provides a method for reconstructing almost all signals from knowledge of how the zero-crossing contour...
متن کاملDiffusion Fingerprints
We introduce a new method for classifying and clustering data exhibiting associative properties. By means of graph theoretical tools, we show how to generate diffusion fingerprints for each subset of the data collection. We then propose a simple and computationally efficient technique for dimensionality reduction. Throughout this paper, we apply our method to the problem of classifying a corpus...
متن کاملQuantum Fingerprints
The one thing everyone knows about quantum mechanics is its legendary weirdness, in which the basic tenets of the world it describes seem alien to the world we live in. Superposition, where things can be in two states simultaneously, a switch both on and off, a cat both dead and alive. Or entanglement, what Einstein called "spooky action-at-distance" in which objects are invisibly linked, even ...
متن کاملCognitive Fingerprints
Ever since “True Names” by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. The rash of recent cyber-attacks targeting consumers, coupled with the massive amount of available digital data, has forced us to rethink our very notion of authentication as a one-shot ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Materials Today
سال: 2011
ISSN: 1369-7021
DOI: 10.1016/s1369-7021(11)70284-x