An Object Detection using Image Processing in Digital Forensics Science
Journal Title: Journal of Independent Studies and Research - Computing - Year 2018, Vol 16, Issue 1
Abstract
Object detection is one of the most important sectors in digital forensics science. The object detection technique is valuable for a number of purposes for instance: medical diagnosis scanners, traffic monitoring system, airport security examination, law regulation firms, and for diverse local or international data rescue departments. The purpose of my paper is to deliver an object detection method to detect a weapon in a camera image by relating a detailed analysis of weapon detection techniques such as image enhancement, image segmentation, image feature extraction, and image classification. However, the applicable techniques are created through the computation of different mathematical and algorithms models.
Authors and Affiliations
Kamran Ali Changezi, Muhammad Wasil Zafar
Extracting a Graph Model by Mapping Two Heterogeneous Graphs
With the development of wireless communications, several studies have been performed on Location based Services due to their numerous applications. Amongst those recommendations, Travel Planning and Recommendations are f...
Improving Query Response Time for Graph Data Using Materialization
Graphs are used in many disciplines, from communication networks, biological, social networks includ- ing maths and other fields of science. This is the latest and most important field of computer science today. In this...
Information Extraction of Diseases and its Application
Named Entity Recognition is an essential module of Information Extraction in the field of bio-medical and diseases are one of the most important sector to study in the medical field, but since the amount of incessantly u...
Analytical Comparison of RSA and RSA with Chinese Remainder Theorem
RSA encryption algorithm is one of the most powerful public key encryption algorithm. The problem with RSA algorithm is that RSA decryption is relatively slow in comparison to RSA encryption. Chinese Remainder Theorem (C...
Analysis of SSD Utilization by Graph Processing Systems
Graph Processing Systems are highly productive when it comes to graph data. While using data parallel approach, it could not exploit common characteristics of a graph computation workload. To address all these challenges...