Дисертації з теми "Criminal investigation Data processing"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Criminal investigation Data processing".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Carnaz, Gonçalo José Freitas. "A graph-based framework for data retrieved from criminal-related documents." Doctoral thesis, Universidade de Évora, 2021. http://hdl.handle.net/10174/29954.
Повний текст джерелаYalcinkaya, Ramazan. "Police officers' adoption of information technology: A case study of the Turkish POLNET system." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc3900/.
Повний текст джерелаHargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.
Повний текст джерелаHargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.
Повний текст джерелаAsk, Karl. "Criminal investigation : motivation, emotion and cognition in the processing of evidence /." Göteborg : Dept. of Psychology Göteborg Univ, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/513716297.pdf.
Повний текст джерелаPadhye, Manoday D. "Use of data mining for investigation of crime patterns." Morgantown, W. Va. : [West Virginia University Libraries], 2006. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4836.
Повний текст джерелаTitle from document title page. Document formatted into pages; contains viii, 108 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 80-81).
Brouse, Andrew. "The interharmonium : an investigation into networked musical applications and brainwaves." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33878.
Повний текст джерелаSlingsby, T. P. "An investigation into the development of a facilities management system for the University of Cape Town." Master's thesis, University of Cape Town, 2004. http://hdl.handle.net/11427/5585.
Повний текст джерелаTodd, Peter A. "An experimental investigation of the impact of computer based decision aids on the process of preferential choice." Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/29442.
Повний текст джерелаBusiness, Sauder School of
Graduate
Olson, Chandra. "Jini an investigation in distributed computing /." [Florida] : State University System of Florida, 2001. http://etd.fcla.edu/etd/uf/2001/ank7122/chandra.PDF.
Повний текст джерелаTitle from first page of PDF file. Document formatted into pages; contains viii, 71 p.; also contains graphics. Vita. Includes bibliographical references (p. 69-70).
Salmon, Gwendal. "Processing of shear waves from VSP data at the Forsmark site investigation." Thesis, Uppsala universitet, Geofysik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-183684.
Повний текст джерелаSmith, Michael Alan. "An empirical investigation of the determinants of information systems outsourcing." Diss., Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/29455.
Повний текст джерелаSpence, William MacDonald. "Investigation into the opportunities presented by big data for the 4C Group." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/97409.
Повний текст джерелаENGLISH ABSTRACT: The telecommunications industry generates vast amounts of data on a daily basis. The exponential growth in this industry has, therefore, increased the amounts of nodes that generates data on a near real-time basis, and the required processing power to process all this information has increased as well. Organisations in different industries have experienced the same growth in information processing, and, in recent years, professionals in the Information Systems (IS) industry have started referring to these challenges as the concept of Big Data (BD). This theoretical research investigated the definition of big data as defined by several leading players in the industry. The theoretical research further focussed on several key areas relating to the big data era: i) Common attributes of big data. ii) How do organisations respond to big data? iii) What are the opportunities that big data provide to organisations? A selecting of case studies are presented to determine what other players in the IS industry does to exploit big data opportunities. The study signified that the concept of big data has emerged due to IT infrastructure struggling to cope with the increased volumes, variety and velocity of data being generated and that organisations are finding it difficult to incorporate the results from new and advanced mining and analytical techniques into their operations in order to extract the maximum value from their data. The study further found that big data impacts each component of the modern day computer based information system and the exploration of several practical cases further highlighted how different organisations have addressed this big data phenomenon in their IS environment. Using all this information, the study investigated the 4C Group business model and identified some key opportunities for this IT vendor in the big data era. As the 4C Group has positioned themselves across the ICT value chain, big data presents several good opportunities to explore in all components of the IS. While training and consulting can establish the 4C Group as a big data knowledgeable vendor, some enhancements to their application software functionalities can provide additional big data opportunities. And as true big data value only originates from the utilization of the data in the daily decision making processes, by offering IaaS the 4C Group can enable their clients to achieve the illusive goal of becoming a data driven organisation.
Van, der Walt Craig. "An investigation into the practical implementation of speech recognition for data capturing." Thesis, Cape Technikon, 1993. http://hdl.handle.net/20.500.11838/1156.
Повний текст джерелаA study into the practical implementation of Speech Recognition for the purposes of Data Capturing within Telkom SA. is described. As datacapturing is increasing in demand a more efficient method of capturing is sought. The technology relating to Speech recognition is herein examined and practical gnidelines for selecting a Speech recognition system are described. These guidelines are used to show how commercially available systems can be evaluated. Specific tests on a selected speech recognition system are described, relating to the accuracy and adaptability of the system. The results obtained illustrate why at present speech recognition systems are not advisable for the purpose of Data capturing. The results also demonstrate how the selection of keywords words can affect system performance. Areas of further research are highlighted relating to recognition performance and vocabulary selection.
Tse, Ka-sze Hayson, and 謝家樹. "Bayesian network analysis of evidence in criminal court cases / y Hayson Ka-sze Tse." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2015. http://hdl.handle.net/10722/212618.
Повний текст джерелаpublished_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Kubisak, Timothy D. "Investigation of acoustic vector sensor data processing in the presence of highly variable bathymetry." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42664.
Повний текст джерелаData has been collected on acoustic vector sensors mounted on autonomous underwater gliders in the Monterey Bay during 2012–2013. Previous processing work computed the acoustic vector intensity to estimate bearing to impulsive sources of interest. These sources included small explosive shots deployed by local fishermen and humpback whale vocalizations. While the highly impulsive shot data produced unambiguous bearing estimations, the longer duration whale vocalizations showed a fairly wide spread in bearing. In this work, causes of the ambiguity in bearing estimation are investigated in the context of the highly variable bathymetry of the Monterey Bay Canyon, as well as the coherent multipath interference in the longer duration calls. Sound speed data collected during the previous experimental effort, along with a three-dimensional bathymetric relief of the Monterey Bay Canyon, are incorporated into a three-dimensional version of the Monterey-Miami Parabolic Equation Model. Propagation results are computed over a frequency band from 336–464 Hz in order to provide predictions of pulse arrival structure. This data is analyzed using conventional pressure plane-wave beamforming techniques in order to highlight horizontal coupling caused by the canyon bathymetry. The data is also analyzed using the previously developed acoustic vector intensity processing string and shown to exhibit a qualitatively similar spread in the estimated bearing.
Khan, Abdullah. "An investigation into improving the functioning of manufacturing executions system at the Impala base metals refinery." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/6408.
Повний текст джерелаBaxter, David. "Perception of organisational politics and workplace innovation : an investigation of the perceptions and behaviour of staff in an Australian IT services organisation /." Swinburne Research Bank, 2004. http://hdl.handle.net/1959.3/46062.
Повний текст джерелаA thesis submitted to the fulfilment of the requirements for the degree of Doctor of Philosophy, Australian Graduate School of Entrepreneurship, Swinburne University of Technology, 2004. Typescript. Includes bibliographical references (p. 229-230).
Cooke, Nicholas Duncan. "Initial findings of an investigation into the feasibility of a low level image processing workstation using transputers." Thesis, Rhodes University, 1990. http://hdl.handle.net/10962/d1006702.
Повний текст джерелаYang, Wenwei, and 楊文衛. "Development and application of automatic monitoring system for standard penetration test in site investigation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B36811919.
Повний текст джерелаMiles, Shaun Graeme. "An investigation of issues of privacy, anonymity and multi-factor authentication in an open environment." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1006653.
Повний текст джерелаAdobe Acrobat Pro 9.5.1
Adobe Acrobat 9.51 Paper Capture Plug-in
Ndwe, Tembalethu Jama. "An investigation into the viability of deploying thin client technology to support effective learning in a disadvantaged, rural high school setting." Thesis, Rhodes University, 2002. http://hdl.handle.net/10962/d1006500.
Повний текст джерелаAdonis, Ridoh. "An empirical investigation into the information management systems at a South African financial institution." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2474.
Повний текст джерелаThe study has been triggered by the increase in information breaches in organisations. Organisations may have policies and procedures, strategies and systems in place in order to mitigate the risk of information breaches; however, data breaches are still on the rise. Governments across the world have or are putting in place laws around data protection which organisations have to align their process, strategies and systems to. The continuous and rapid emergence of new technology is making it even easier for information breaches to occur. In particular, the focus of this study is aimed at the information management systems in a selected financial institution in South Africa. Based on the objectives, this study: explored the shortfalls of information security on a South African financial institution; investigated whether data remains separate while privacy is ensured; investigated responsiveness of business processes on information management; investigated the capability of systems on information management; investigated the strategies formulated for information management and finally, investigated projects and programmes aimed at addressing information management. Quantitative, as well as qualitative analysis, was employed whereby questionnaires were sent to employees who were employed at junior management positions. Semi- structured in-depth interviews were self-administered whereby the researcher interviewed senior management at the organisation. These senior managers from different value chains are responsible for implementing information management policies and strategy.
Jones, Susan M. "An investigation of methodologies for software development prototyping." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 1993. https://ro.ecu.edu.au/theses/1150.
Повний текст джерелаCarrus, Elisa. "An investigation into the interaction between music and language processing : evidence from EEG and behavioural data." Thesis, Goldsmiths College (University of London), 2011. http://eprints.gold.ac.uk/7053/.
Повний текст джерелаChan, Yik-Kwan Eric, and 陳奕鈞. "Investigation of a router-based approach to defense against Distributed Denial-of-Service (DDoS) attack." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30173309.
Повний текст джерелаKohnen, William. "A prototype investigation of a multi-GHz multi-channel analog transient recorder /." Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=65462.
Повний текст джерелаTee, Singwhat. "An empirical investigation of factors influencing organisations to improve data quality in their information systems /." St. Lucia, Qld, 2003. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe17473.pdf.
Повний текст джерелаLaubscher, Robert Alan. "An investigation into the use of IEEE 1394 for audio and control data distribution in music studio environments." Thesis, Rhodes University, 1999. http://hdl.handle.net/10962/d1006483.
Повний текст джерелаMicrosoft Word
Adobe Acrobat 9.46 Paper Capture Plug-in
Cucciniello, Maria. "Investigation of the use of ICT in the modernization of the health care sector : a comparative analysis." Thesis, University of Edinburgh, 2011. http://hdl.handle.net/1842/8733.
Повний текст джерелаDelFrate, Judith. "An investigation of teachers' backgrounds, usage, and attitudes towards computers in education /." The Ohio State University, 1987. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487584612163682.
Повний текст джерелаAinul, Azyan Zuliyanti Hanizan. "An investigation into the practicality of using a digital camera's RAW data in print publishing applications /." Link to online version, 2005. https://ritdml.rit.edu/dspace/handle/1850/1110.
Повний текст джерелаBeauvais, Erik Alexander Maoui. "An investigation of a framework to evaluate computer supported collaborative work." Thesis, Rhodes University, 1999. http://eprints.ru.ac.za/1383/.
Повний текст джерелаHutton, Alistair James. "An empirical investigation of issues relating to software immigrants." Thesis, Connect to e-thesis, 2008. http://theses.gla.ac.uk/136/.
Повний текст джерелаPh.D. thesis submitted to the Department of Computing Science, Faculty of Information and Mathematical Sciences, University of Glasgow, 2008. Includes bibliographical references. Print version also available.
Klinkradt, Bradley Hugh. "An investigation into the application of the IEEE 1394 high performance serial bus to sound installation contro." Thesis, Rhodes University, 2003. http://hdl.handle.net/10962/d1004899.
Повний текст джерелаKMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
Ferguson, Colin B., and mikewood@deakin edu au. "An investigation of the effects of microcomputers on the work of professional accountants." Deakin University. School of Accounting and Finance, 1994. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20050915.155628.
Повний текст джерелаCleal, Bryan. "Capturing communities : the account of an anthropological investigation into technology and innovation within a 'European' framework." Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274162.
Повний текст джерелаAl-Mushayt, Omar S. "An empirical investigation of factors influencing the successful treatment of organisational issues in information systems development." Thesis, Loughborough University, 2000. https://dspace.lboro.ac.uk/2134/7254.
Повний текст джерелаLo, Kin-keung, and 羅建強. "An investigation of computer assisted testing for civil engineering students in a Hong Kong technical institute." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1988. http://hub.hku.hk/bib/B38627000.
Повний текст джерелаMajeke, Lunga. "Preliminary investigation into estimating eye disease incidence rate from age specific prevalence data." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/464.
Повний текст джерелаGultekin, Kubra. "Knowledge Management and Law Enforcement: An Examination of Knowledge Management Strategies of the Police Information System (POLNET) in the Turkish National Police." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc11040/.
Повний текст джерелаHeacock, Gregory. "An investigation of the role of virtual reality systems and their application to ophthalmic teaching, diagnosis and treatment." Thesis, King's College London (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287483.
Повний текст джерелаIrwin, Barry Vivian William. "Bandwidth management and monitoring for IP network traffic : an investigation." Thesis, Rhodes University, 2001. http://hdl.handle.net/10962/d1006492.
Повний текст джерелаRuss, Keith David. "An investigation into the application of computers for the processing of survey and planning data for 2D and 3D interpretation." Thesis, University of Exeter, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260748.
Повний текст джерелаSchlenkrich, Lara. "An investigation of social computing." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1006194.
Повний текст джерелаTang, Shijun. "Investigation on Segmentation, Recognition and 3D Reconstruction of Objects Based on LiDAR Data Or MRI." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801920/.
Повний текст джерелаZou, Haichuan. "Investigation of hardware and software configuration on a wavelet-based vision system--a case study." Thesis, Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/8719.
Повний текст джерелаAndress, John Charles. "Development of the BaBar trigger for the investigation of CP violation." Thesis, University of Bristol, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.322355.
Повний текст джерелаFunk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.
Повний текст джерелаENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global communication and the accompanying legal problems. This is followed by an examination of the different functions Internet providers have. A survey of some of the important crimes affecting the Internet and also some Internet-specific offences put the more general issue of liability in a more specific context. Traditional and new forms of crimes are discussed. This section is followed by an analysis of Internet provider liability under German criminal law and Germany's Teleservices Act. From an international criminal law perspective some international instruments, like the Cybercrime Convention of the Council of Europe, is discussed. National legislation, especially in the context of the European Union, must always be put in the proper regional and international context. The thesis concludes with some thoughts on alternative, or perhaps complementary, methods to fight illegal and criminal conduct on the Internet. This is done not as a critique of the responses to Internet crime, but rather to strengthen the many hands trying to reduce Internet crime.
AFRIKAANSE OPSOMMING: Hierdie tesis handeloor die strafregtelike aanspreekliheid van Internet diensverskaffers. Die fokus val op Duitsland, maar die analise word ook geplaas in 'n wyer, vergelykende konteks. Dit word gedoen met verwysing na Suid-Afrika, sowel as Europa en die VSA. Die tesis demonstreer en bespreek die bestaande regsnorme wat Internet diensverskaffers reguleer met spesifieke verwysing na aanspreeklikheid vir onwettige inhoud op die Internet en internasionale pogings om hierdie probleem aan te spreek. Ter inleiding word daar aangetoon hoe die Internet aanleiding gee tot nuwe vorme van globale kommunikasie en die regsprobleme wat dit tot gevolg het. Dit word gevolg deur 'n ondersoek na die verskillende funksies van Internet verskaffers. 'n Ontleding en bespreking van Internet-spesifieke misdrywe plaas die meer algemene vraagstuk in 'n meer gefokusde konteks. Tradisionele en nuwe vorme van misdaad word bespreek. Hierdie afdeling word gevolg deur 'n ontleding van Internet diensverskaffer aanspreeklikheid ingevolge Duitse reg en die Duitse wetgewing op die terrein van telediens. Uit 'n internasionale strafreg oogpunt word sekere internasionale instrumente, soos die Cybercrime Convention van die Raad van Europa, bespreek. Nasionale wetgewing, veral in die konteks van die Europese Unie, word ook in die relevante regionale en internasionale konteks geplaas. Die tesis word afgesluit met sekere gedagtes oor alternatiewe, of moontlik komplimentêre, metodes in die stryd teen Internet-kriminaliteit. Dit moet nie gesien word as kritiek op die huidige stand van sake nie, maar eerder as 'n poging om die talle rolspelers in die stryd teen Internet misdaad se hande te sterk.
Williams, Patricia A. "An investigation into information security in general medical practice." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2007. https://ro.ecu.edu.au/theses/274.
Повний текст джерела