Search
Now showing items 1-10 of 63
Chitosan And Dextran Based Powders – The Preparation, Performance Comparison and Potential Application in Forensic Examination of Latent Fingermarks
(Ankara : Institute of Forensic Sciences, 2022)
The papillary lines are unique for each person, and that feature is frequently used in modern forensic science to identify and distinguish individuals. Fingerprints are often present at the crime scene, but they are usually ...
Development Concepts of Virtual Reality Software
(Timisoara : Faculty Engineering Hunedoara, University Politehnica Timisoara, 2020)
The evolution of appropriate hardware and software platforms has resulted in intensive increase in suchapplications that have placed their action in the virtual world. This enables users a special experience – the experience ...
Visualization of Latent Fingerprints Using Dextran-Based Micropowders Obtained from Anthocyanin Solution
(Ankara : Institute of Forensic Sciences, 2020)
Fingerprints are usually classified as patent, plastic, and/or latent. However, detection and visualization of latent fingerprints, as relevant traces found at the crime scene are very important for reliable identification ...
Indicators of Absolute and Relative Changes in Skeletal Muscle Mass during Adulthood and Ageing
(Basel : MDPI, 18-08-2020)
This study aimed to explore the set of variables related to skeletal muscle mass (SMM) in both sexes, and to create age- and sex-related models of changes in SMM, using the most representative indicator of muscular status. ...
Application of Artificial Immune Networks in Continuous Function Optimizations
(Budapest : Óbuda University, 2022)
This paper deals with the application of artificial immune networks in continuous
function optimizations. The performance of the immunological algorithms is analyzed using
the Optimization Algorithm Toolkit. It is shown ...
The Nullity, Rank, and Invertibility of Linear Combinations of k-Potent Matrices
(Basel : MDPI, 2020)
Baksalary et al. (Linear Algebra Appl., doi:10.1016/j.laa.2004.02.025, 2004) investigated the invertibility of a linear combination of idempotent matrices. This result was improved by Koliha et al. (Linear Algebra Appl., ...
A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes : an end-user perspective / Упоредна пилот-анализа софтверских окружења Куку и Драквуф за изоловано извршавање програма : перспектива крајњег корисника
(Beograd : Univerzitet odbrane = Belgrade : University of defence, 2022)
Introduction/purpose: This paper reports on a pilot comparative analysis of the Cuckoo and Drakvuf sandboxes. These sandboxes are selected as the subjects of the analysis because of their popularity in the professional ...
Ванинституционалне мере и други кривичноправни инструменти реакције на криминалитет и позитивно кривично законодавство Србије (испуњена очекивања или не) / Non-institutional measures and other criminal justice instruments of response to crime and positive criminal legislation of Serbia (expectations fulfilled or not)
(Београд : Српско удружење за кривичноправну теорију и праксу : Intermex, 2022)
Имајући у виду тему "Ванинституционалне мере и други кривичноправни
инструменти реакције на криминалитет и позитивно кривично законодавство
Србије" приступ у раду смо поделили на два дела. Први се односи на ...
Pre-crime concept as an effective instrument of penalty policy for the crime of domestic violence – new challenges for Serbia / Pre-crime concept kao efikasan instrument kaznene politike kaznenog djela nasilja u obitelji – novi izazovi za Srbiju
(Ministarstvo unutarnjih poslova Republike Hrvatske, Policijska akademija / Ministry of the Interior of the Republic of Croatia, Police Academy, 2020)
Contemporary tendencies of criminal procedure legislation in general, including criminal
procedure legislation of Serbia, have been increasingly emphasizing the importance of the
implementation of the preventive aspect ...
A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks
(Basel, Switzerland : MDPI, 2021)
Modern access controls employ biometrics as a means of authentication to a great extent.
For example, biometrics is used as an authentication mechanism implemented on commercial devices
such as smartphones and laptops. ...