Positional Prediction of Individuals Present In a Crime Scene
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: The scientific study/interpretation of bloodstain patterns at a crime scene, provide invaluable evidence for sequencing, reconstruction of events that might have occurred at the crime scene. the authors have tried to amalgamate the works that have particularly contributed towards scientific advancement in thedocumentation, interpretation of bloodstain patterns, thereby putting forth the research initiative that they (i.e. the authors) intend to undertake within the multidisciplinary domain of bloodstain pattern analysis. Authors try to overview the entire crime scene process
Authors and Affiliations
Prof. (Dr. )Samir Kumar Bandyopadhyay , NabanitaBasu
Quantum Key Distribution Protocols: A Review
Abstract : Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protoc...
An Overview of Spectrum Sensing and its Techniques
Abstract: Cognitive radio networks provide high bandwidth to mobile users via heterogeneous wireless architectures and dynamic spectrum access techniques. It basically avoids congestion in wireless communicatio...
Selfish Node Detection in Replica Allocation over MANETs
: MOBILE ad hoc networks (MANETs) have attracted a lot of attention due to the popularity of mobile devices and the advances in wireless communication technologies. A MANET is a peer-to-peer multi hop mobile wire...
Thorny Issues of Stakeholder Identification and Prioritization in Requirement Engineering Process
Identifying the stakeholder in requirement engineering process is one of the critical issues. It performs a remarkable part for successful project completion. The software project largely depends on several  ...
Image Steganography and Global Terrorism
This paper informs the reader how an innocent looking digital image hides a deadly terrorist plan. It analyses the strengths of image steganography and the reasons why terrorists are relying on it. It also aims t...