Hacktivist Activity

Hacktivist Activity The imposing presence of new cyber technology in current society is undeniable. In the same fashion, cyber technologies are a reflection of marketing innovations, where cyber security related crimes had found a fertile terrain as a rebellion to...

velopharyngeal (VP) mechanism

velopharyngeal (VP) mechanism The vocal tract begins above the true vocal folds and includes the nasal, oral, and pharyngeal cavities. In addition to its functions in breathing and swallowing, the vocal tract enables speech production. This region also includes the...

Implant screw mechanics

Implant screw mechanics The screw joint consists of the two parts tightened together by a screw, such as an abutment and an implant being held together by a screw. The interplay of screw joint separating forces (external) and clamping forces (internal) affect screw...

MRI : Magnetic Resonance Imaging

Tongue Cancer The Center for Disease Control and Prevention (CDC) estimates more than 30,000 new cases of oral and pharyngeal cancer are diagnosed each year . One of the most commonly affected sites of oral cancer is the lateral border of the tongue and squamous cell...

Image Guided Radiation Therapy

Introduction Radiation therapy utilizes ionizing radiation with the goal of curing or palliating disease and minimizing damage to healthy tissue. Localization using Image Guided Radiation Therapy (IGRT) is performed in order to ensure tumor location and minimize...

standardized uptake values (SUV)

standardized uptake values (SUV) Positron emission tomography (PET) has become a widely utilized functional imaging modality. The combination of x-ray computed tomography (CT) with PET gives both structural and functional information from a single two part scan as...

Criminal Activity on Tor

Criminal Activity on Tor When standard communications traverse the Internet, they do so in form of TCP/IP packets. These packets are like envelopes that are stamped with the address of the intended recipient and the return address of the original sender . If a third...

Definition of Cyber Crime

Definition of Cyber Crime Cyber crime is only different from traditional crime by the way it is carried out or committed. Cyber crime is real-world crime that has migrated into cyberspace .Parker describes the ways in which computers can play a role in cyber crime or...

Algorithm for Eating Detection

Algorithm for Eating Detection The eating detection mechanism is contained in the Eating Detector class of the Python module Eating Detector. This class is responsible for detecting the eating activity of the patient in the home A change in state is required of all...

Embedded System

Embedded System The embedded system consists of three types of hardware components and a user interface. First, we have the sensors. Numerous passive and active sensors are used to monitor the patient’s activities and location within the home. Second, a number of...

Techniques for Network Data Collection

Techniques for Network Data Collection Political scientists have applied a variety of approaches to collect data for statistical network analysis on political actors, including questionnaires, observations,experiments, and archival record analysis. In this section, I...

Tools In Adroid Memory Forensics

Dalvik Inspector To establish the environment for conducting the tool analysis of Dalvik Inspector alpha (DI), various attempts to build a test environment were assembled on variety of operating systems and hardware. Each was configured with a minimum suite of...

Hashtags of twitter

Hashtags of twitter Twitter uses proprietary algorithms to surface trending topics, which may not be represented by hashtags. Despite not divulging their methodology for identifying trending topics, Twitter has stated that key metrics for the algorithms include...

Twitter

Twitter  Millions of Twitter users take advantage of Twitter’s ability to broadcast information pertaining to whatever topics they choose; likewise, millions of Twitter users receive an unending flood of undercategorized information. Computer-mediated social...

Support Vector Machines

The Support vector machines are learning models that are supervised in nature. The SVM models are models with related learning algorithms. These learning models perceive examples, patterns, and investigate data given. The SVM models are generally used in...

Random Forest Classifier

Random forest creates a number of decision tress. The decision trees are created depending on the random selection of data and also the selection of variables randomly. The class of the dependent variable is determined by the class based on many decision trees. The...

KNN classifier

KNN is a straightforward algorithm that stores every single accessible case and characterizes new cases taking into account a similarity or closeness measure [25]. KNN is a non-parametric lazy learning algorithm [26]. By non-parametric technique, it implies that that...

Exploration activity in Oil & Gas

During the past few decades, the focus of exploration activity has shifted considerably within the Western Canada Sedimentary Basin, and more broadly within North America. Conventional exploration and production technologies have been replaced by technologies...

X-ray Dose measurement

X-ray Dose measurement In this section we briefly review different definitions, units, and measurement methods of X-ray dose in CT imaging. Dose is a general term used to quantify how much radiation exposure aperson (or other material) has received. Radiation dose...

Iterative Reconstruction

  Iterative Reconstruction The quality of the images reconstructed by standard FBP algorithms depend on several assumptions about scanner geometry and raw data, such as continuity of the projections and noiseless measurements, which are typically violated. The...

The Mercury/Tornado RF signal receiver

The Mercury/Tornado RF signal receiver The received signal from a diffusion experiment has a wide dynamic range, with the diffusion weighted image having approximately 33% the signal of the un-weighted image when choosing a b-value that maximizes the DNR (S=exp(-b*D)...

Traditional Methods of Human Hair Examinations

There are four traditional methods of hair examination. The methods should be performed from general to particular, and from non-destructive to destructive. Therefore, the methods must begin with macroscopical examination, then microscopical examination, and end with...

Characteristics of Hair

It is generally accepted that color and microscopically observable contributing pigment components are the features most relied upon by forensic hair experts, with color being the most critical comparative characteristic available to the examiner. The color of hair...

Phases of Hair Growth

There are three phases of mammalian hair follicle growth. In the anagen phase, the hair is actively growing; the catagen phase is the transitional period between the other two phases; and in the telogen phase, the follicle is dormant [5].     Anagen Hair...

Structure of Hair

Structure of Hair The structure of hair can be divided into three anatomical regions, and three structures within those regions. The three anatomical regions are the root, shaft, and distal tip (see Figure 1). The root is the follicular structure at the proximal end...

Hair analysis

Human hair is a common type of physical evidence recovered at the scene of a crime or zones of mass disasters. It is traditionally subjected to light microscopy and nuclear DNA (nDNA) analysis. nDNA analysis is considered the most discriminating method, and can stand...

Discrete Tomography

Discrete Tomography If the amount of available projection data is limited (e.g. with few-view tomography,a limited angular range or data truncation) the reconstruction problem is ill-posed and conventional algebraic reconstruction methods tend to find solutions that...

Tomographic Segmentation

Tomographic Segmentation To extract quantitative information from a tomographic reconstruction, it is often segmented first. Segmentation refers to the act of classifying image pixels into a few distinct classes based on a certain characteristic, typically their grey...

Volumetric Optical Coherence Tomography

Rapid Volumetric OCT Image Acquisition transformations, such as wavelet and discrete cosine transforms. The popular JPEG-2000 image compression algorithm implements a version of the decimated wavelet transform with great success. During the compression stage, many of...

Performance Evaluation Techniques in data mining

Evaluation of classification methods is one of the most important step in data mining. The most techniques are confusion matrix, learning curves and receiver operating curves (ROC). The confusion matrix shows the number of correct and incorrect prediction made by the...

k-Fold Cross Validation

A k-fold cross validation technique is used to minimize the overfitting or bias in the predictive modeling techniques used in this study. k-Fold cross validation is used with decision tree and neural network with MLP and RBF to generate more flexible models to reduce...

Regression

Regression models are the oldest prediction models: they create a specific association structure between inputs and targets. They use mathematical equations to predict cases using input variables. There are two forms of regressions: linear and logistic regression. In...

Artificial Neural Network

Artificial Neural Network (ANN) are powerful tools and mathematical models used for pattern recognition and modeling. ANN behave in a similar fashion as that of the biological neurons found in nature. They are usually referred to as Neural Network and are used for...

Decision Trees

Decision trees can be defined as structures that can be used to develop a graphical user interface where large data is divided into successively smaller sets of records. Decision trees are governed by a set of rules that are used to produce successively smaller sets...