Dissertations / Theses on the topic 'Criminal investigation Data processing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Criminal investigation Data processing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Carnaz, Gonçalo José Freitas. "A graph-based framework for data retrieved from criminal-related documents." Doctoral thesis, Universidade de Évora, 2021. http://hdl.handle.net/10174/29954.
Full textYalcinkaya, Ramazan. "Police officers' adoption of information technology: A case study of the Turkish POLNET system." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc3900/.
Full textHargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.
Full textHargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.
Full textAsk, Karl. "Criminal investigation : motivation, emotion and cognition in the processing of evidence /." Göteborg : Dept. of Psychology Göteborg Univ, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/513716297.pdf.
Full textPadhye, Manoday D. "Use of data mining for investigation of crime patterns." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4836.
Full textTitle from document title page. Document formatted into pages; contains viii, 108 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 80-81).
Brouse, Andrew. "The interharmonium : an investigation into networked musical applications and brainwaves." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33878.
Full textSlingsby, T. P. "An investigation into the development of a facilities management system for the University of Cape Town." Master's thesis, University of Cape Town, 2004. http://hdl.handle.net/11427/5585.
Full textTodd, Peter A. "An experimental investigation of the impact of computer based decision aids on the process of preferential choice." Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/29442.
Full textBusiness, Sauder School of
Graduate
Olson, Chandra. "Jini an investigation in distributed computing /." [Florida] : State University System of Florida, 2001. http://etd.fcla.edu/etd/uf/2001/ank7122/chandra.PDF.
Full textTitle from first page of PDF file. Document formatted into pages; contains viii, 71 p.; also contains graphics. Vita. Includes bibliographical references (p. 69-70).
Salmon, Gwendal. "Processing of shear waves from VSP data at the Forsmark site investigation." Thesis, Uppsala universitet, Geofysik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-183684.
Full textSmith, Michael Alan. "An empirical investigation of the determinants of information systems outsourcing." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/29455.
Full textSpence, William MacDonald. "Investigation into the opportunities presented by big data for the 4C Group." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/97409.
Full textENGLISH ABSTRACT: The telecommunications industry generates vast amounts of data on a daily basis. The exponential growth in this industry has, therefore, increased the amounts of nodes that generates data on a near real-time basis, and the required processing power to process all this information has increased as well. Organisations in different industries have experienced the same growth in information processing, and, in recent years, professionals in the Information Systems (IS) industry have started referring to these challenges as the concept of Big Data (BD). This theoretical research investigated the definition of big data as defined by several leading players in the industry. The theoretical research further focussed on several key areas relating to the big data era: i) Common attributes of big data. ii) How do organisations respond to big data? iii) What are the opportunities that big data provide to organisations? A selecting of case studies are presented to determine what other players in the IS industry does to exploit big data opportunities. The study signified that the concept of big data has emerged due to IT infrastructure struggling to cope with the increased volumes, variety and velocity of data being generated and that organisations are finding it difficult to incorporate the results from new and advanced mining and analytical techniques into their operations in order to extract the maximum value from their data. The study further found that big data impacts each component of the modern day computer based information system and the exploration of several practical cases further highlighted how different organisations have addressed this big data phenomenon in their IS environment. Using all this information, the study investigated the 4C Group business model and identified some key opportunities for this IT vendor in the big data era. As the 4C Group has positioned themselves across the ICT value chain, big data presents several good opportunities to explore in all components of the IS. While training and consulting can establish the 4C Group as a big data knowledgeable vendor, some enhancements to their application software functionalities can provide additional big data opportunities. And as true big data value only originates from the utilization of the data in the daily decision making processes, by offering IaaS the 4C Group can enable their clients to achieve the illusive goal of becoming a data driven organisation.
Van, der Walt Craig. "An investigation into the practical implementation of speech recognition for data capturing." Thesis, Cape Technikon, 1993. http://hdl.handle.net/20.500.11838/1156.
Full textA study into the practical implementation of Speech Recognition for the purposes of Data Capturing within Telkom SA. is described. As datacapturing is increasing in demand a more efficient method of capturing is sought. The technology relating to Speech recognition is herein examined and practical gnidelines for selecting a Speech recognition system are described. These guidelines are used to show how commercially available systems can be evaluated. Specific tests on a selected speech recognition system are described, relating to the accuracy and adaptability of the system. The results obtained illustrate why at present speech recognition systems are not advisable for the purpose of Data capturing. The results also demonstrate how the selection of keywords words can affect system performance. Areas of further research are highlighted relating to recognition performance and vocabulary selection.
Tse, Ka-sze Hayson, and 謝家樹. "Bayesian network analysis of evidence in criminal court cases / y Hayson Ka-sze Tse." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2015. http://hdl.handle.net/10722/212618.
Full textpublished_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Kubisak, Timothy D. "Investigation of acoustic vector sensor data processing in the presence of highly variable bathymetry." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42664.
Full textData has been collected on acoustic vector sensors mounted on autonomous underwater gliders in the Monterey Bay during 2012–2013. Previous processing work computed the acoustic vector intensity to estimate bearing to impulsive sources of interest. These sources included small explosive shots deployed by local fishermen and humpback whale vocalizations. While the highly impulsive shot data produced unambiguous bearing estimations, the longer duration whale vocalizations showed a fairly wide spread in bearing. In this work, causes of the ambiguity in bearing estimation are investigated in the context of the highly variable bathymetry of the Monterey Bay Canyon, as well as the coherent multipath interference in the longer duration calls. Sound speed data collected during the previous experimental effort, along with a three-dimensional bathymetric relief of the Monterey Bay Canyon, are incorporated into a three-dimensional version of the Monterey-Miami Parabolic Equation Model. Propagation results are computed over a frequency band from 336–464 Hz in order to provide predictions of pulse arrival structure. This data is analyzed using conventional pressure plane-wave beamforming techniques in order to highlight horizontal coupling caused by the canyon bathymetry. The data is also analyzed using the previously developed acoustic vector intensity processing string and shown to exhibit a qualitatively similar spread in the estimated bearing.
Khan, Abdullah. "An investigation into improving the functioning of manufacturing executions system at the Impala base metals refinery." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/6408.
Full textBaxter, David. "Perception of organisational politics and workplace innovation : an investigation of the perceptions and behaviour of staff in an Australian IT services organisation /." Swinburne Research Bank, 2004. http://hdl.handle.net/1959.3/46062.
Full textA thesis submitted to the fulfilment of the requirements for the degree of Doctor of Philosophy, Australian Graduate School of Entrepreneurship, Swinburne University of Technology, 2004. Typescript. Includes bibliographical references (p. 229-230).
Cooke, Nicholas Duncan. "Initial findings of an investigation into the feasibility of a low level image processing workstation using transputers." Thesis, Rhodes University, 1990. http://hdl.handle.net/10962/d1006702.
Full textYang, Wenwei, and 楊文衛. "Development and application of automatic monitoring system for standard penetration test in site investigation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B36811919.
Full textMiles, Shaun Graeme. "An investigation of issues of privacy, anonymity and multi-factor authentication in an open environment." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006653.
Full textAdobe Acrobat Pro 9.5.1
Adobe Acrobat 9.51 Paper Capture Plug-in
Ndwe, Tembalethu Jama. "An investigation into the viability of deploying thin client technology to support effective learning in a disadvantaged, rural high school setting." Thesis, Rhodes University, 2002. http://hdl.handle.net/10962/d1006500.
Full textAdonis, Ridoh. "An empirical investigation into the information management systems at a South African financial institution." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2474.
Full textThe study has been triggered by the increase in information breaches in organisations. Organisations may have policies and procedures, strategies and systems in place in order to mitigate the risk of information breaches; however, data breaches are still on the rise. Governments across the world have or are putting in place laws around data protection which organisations have to align their process, strategies and systems to. The continuous and rapid emergence of new technology is making it even easier for information breaches to occur. In particular, the focus of this study is aimed at the information management systems in a selected financial institution in South Africa. Based on the objectives, this study: explored the shortfalls of information security on a South African financial institution; investigated whether data remains separate while privacy is ensured; investigated responsiveness of business processes on information management; investigated the capability of systems on information management; investigated the strategies formulated for information management and finally, investigated projects and programmes aimed at addressing information management. Quantitative, as well as qualitative analysis, was employed whereby questionnaires were sent to employees who were employed at junior management positions. Semi- structured in-depth interviews were self-administered whereby the researcher interviewed senior management at the organisation. These senior managers from different value chains are responsible for implementing information management policies and strategy.
Jones, Susan M. "An investigation of methodologies for software development prototyping." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1993. https://ro.ecu.edu.au/theses/1150.
Full textCarrus, Elisa. "An investigation into the interaction between music and language processing : evidence from EEG and behavioural data." Thesis, Goldsmiths College (University of London), 2011. http://eprints.gold.ac.uk/7053/.
Full textChan, Yik-Kwan Eric, and 陳奕鈞. "Investigation of a router-based approach to defense against Distributed Denial-of-Service (DDoS) attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30173309.
Full textKohnen, William. "A prototype investigation of a multi-GHz multi-channel analog transient recorder /." Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=65462.
Full textTee, Singwhat. "An empirical investigation of factors influencing organisations to improve data quality in their information systems /." St. Lucia, Qld, 2003. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe17473.pdf.
Full textLaubscher, Robert Alan. "An investigation into the use of IEEE 1394 for audio and control data distribution in music studio environments." Thesis, Rhodes University, 1999. http://hdl.handle.net/10962/d1006483.
Full textMicrosoft Word
Adobe Acrobat 9.46 Paper Capture Plug-in
Cucciniello, Maria. "Investigation of the use of ICT in the modernization of the health care sector : a comparative analysis." Thesis, University of Edinburgh, 2011. http://hdl.handle.net/1842/8733.
Full textDelFrate, Judith. "An investigation of teachers' backgrounds, usage, and attitudes towards computers in education /." The Ohio State University, 1987. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487584612163682.
Full textAinul, Azyan Zuliyanti Hanizan. "An investigation into the practicality of using a digital camera's RAW data in print publishing applications /." Link to online version, 2005. https://ritdml.rit.edu/dspace/handle/1850/1110.
Full textBeauvais, Erik Alexander Maoui. "An investigation of a framework to evaluate computer supported collaborative work." Thesis, Rhodes University, 1999. http://eprints.ru.ac.za/1383/.
Full textHutton, Alistair James. "An empirical investigation of issues relating to software immigrants." Thesis, Connect to e-thesis, 2008. http://theses.gla.ac.uk/136/.
Full textPh.D. thesis submitted to the Department of Computing Science, Faculty of Information and Mathematical Sciences, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
Klinkradt, Bradley Hugh. "An investigation into the application of the IEEE 1394 high performance serial bus to sound installation contro." Thesis, Rhodes University, 2003. http://hdl.handle.net/10962/d1004899.
Full textKMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Ferguson, Colin B., and mikewood@deakin edu au. "An investigation of the effects of microcomputers on the work of professional accountants." Deakin University. School of Accounting and Finance, 1994. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20050915.155628.
Full textCleal, Bryan. "Capturing communities : the account of an anthropological investigation into technology and innovation within a 'European' framework." Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274162.
Full textAl-Mushayt, Omar S. "An empirical investigation of factors influencing the successful treatment of organisational issues in information systems development." Thesis, Loughborough University, 2000. https://dspace.lboro.ac.uk/2134/7254.
Full textLo, Kin-keung, and 羅建強. "An investigation of computer assisted testing for civil engineering students in a Hong Kong technical institute." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1988. http://hub.hku.hk/bib/B38627000.
Full textMajeke, Lunga. "Preliminary investigation into estimating eye disease incidence rate from age specific prevalence data." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/464.
Full textGultekin, Kubra. "Knowledge Management and Law Enforcement: An Examination of Knowledge Management Strategies of the Police Information System (POLNET) in the Turkish National Police." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc11040/.
Full textHeacock, Gregory. "An investigation of the role of virtual reality systems and their application to ophthalmic teaching, diagnosis and treatment." Thesis, King's College London (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287483.
Full textIrwin, Barry Vivian William. "Bandwidth management and monitoring for IP network traffic : an investigation." Thesis, Rhodes University, 2001. http://hdl.handle.net/10962/d1006492.
Full textRuss, Keith David. "An investigation into the application of computers for the processing of survey and planning data for 2D and 3D interpretation." Thesis, University of Exeter, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260748.
Full textSchlenkrich, Lara. "An investigation of social computing." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1006194.
Full textTang, Shijun. "Investigation on Segmentation, Recognition and 3D Reconstruction of Objects Based on LiDAR Data Or MRI." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801920/.
Full textZou, Haichuan. "Investigation of hardware and software configuration on a wavelet-based vision system--a case study." Thesis, Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/8719.
Full textAndress, John Charles. "Development of the BaBar trigger for the investigation of CP violation." Thesis, University of Bristol, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.322355.
Full textFunk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.
Full textENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global communication and the accompanying legal problems. This is followed by an examination of the different functions Internet providers have. A survey of some of the important crimes affecting the Internet and also some Internet-specific offences put the more general issue of liability in a more specific context. Traditional and new forms of crimes are discussed. This section is followed by an analysis of Internet provider liability under German criminal law and Germany's Teleservices Act. From an international criminal law perspective some international instruments, like the Cybercrime Convention of the Council of Europe, is discussed. National legislation, especially in the context of the European Union, must always be put in the proper regional and international context. The thesis concludes with some thoughts on alternative, or perhaps complementary, methods to fight illegal and criminal conduct on the Internet. This is done not as a critique of the responses to Internet crime, but rather to strengthen the many hands trying to reduce Internet crime.
AFRIKAANSE OPSOMMING: Hierdie tesis handeloor die strafregtelike aanspreekliheid van Internet diensverskaffers. Die fokus val op Duitsland, maar die analise word ook geplaas in 'n wyer, vergelykende konteks. Dit word gedoen met verwysing na Suid-Afrika, sowel as Europa en die VSA. Die tesis demonstreer en bespreek die bestaande regsnorme wat Internet diensverskaffers reguleer met spesifieke verwysing na aanspreeklikheid vir onwettige inhoud op die Internet en internasionale pogings om hierdie probleem aan te spreek. Ter inleiding word daar aangetoon hoe die Internet aanleiding gee tot nuwe vorme van globale kommunikasie en die regsprobleme wat dit tot gevolg het. Dit word gevolg deur 'n ondersoek na die verskillende funksies van Internet verskaffers. 'n Ontleding en bespreking van Internet-spesifieke misdrywe plaas die meer algemene vraagstuk in 'n meer gefokusde konteks. Tradisionele en nuwe vorme van misdaad word bespreek. Hierdie afdeling word gevolg deur 'n ontleding van Internet diensverskaffer aanspreeklikheid ingevolge Duitse reg en die Duitse wetgewing op die terrein van telediens. Uit 'n internasionale strafreg oogpunt word sekere internasionale instrumente, soos die Cybercrime Convention van die Raad van Europa, bespreek. Nasionale wetgewing, veral in die konteks van die Europese Unie, word ook in die relevante regionale en internasionale konteks geplaas. Die tesis word afgesluit met sekere gedagtes oor alternatiewe, of moontlik komplimentêre, metodes in die stryd teen Internet-kriminaliteit. Dit moet nie gesien word as kritiek op die huidige stand van sake nie, maar eerder as 'n poging om die talle rolspelers in die stryd teen Internet misdaad se hande te sterk.
Williams, Patricia A. "An investigation into information security in general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/274.
Full text