Forensic analysis of offline signature using multi-layer perception and random forest
Forensic applications having great importance in the digital era, for the investigation of different types of crimes. The forensic analysis includes Deoxyribonucleic Acid (DNA) test, crime scene video and images,, forged documents analysis, computer-based data recovery, fingerprint identifications,...
| Main Authors: | Shah, Abdul Salam, Shah, Masood, Fayaz, Muhammad, Wahid, Fazli, Khan, Hira Khalid, Shah, Asadullah |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science & Engineering Research Support soCiety (SERSC)
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/56182/ http://irep.iium.edu.my/56182/1/13-Forensic-Analysis-of-Offline-Signatures-using-Multilayer.pdf |
Similar Items
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Offline printed Sindhi optical text recognition: survey
by: Solangi, Yasir Ali, et al.
Published: (2019)
by: Solangi, Yasir Ali, et al.
Published: (2019)
An applications development for record keeping of police stations in Pakistan
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
by: Shah, Asadullah
Published: (2019)
by: Shah, Asadullah
Published: (2019)
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
by: Fayaz, Muhammad, et al.
Published: (2018)
by: Fayaz, Muhammad, et al.
Published: (2018)
A Review on energy consumption optimization techniques in IoT based smart building environments
by: Shah, Abdul Salam, et al.
Published: (2019)
by: Shah, Abdul Salam, et al.
Published: (2019)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem
by: Fayaz, Muhammad, et al.
Published: (2018)
by: Fayaz, Muhammad, et al.
Published: (2018)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Relation mining using cross correlation of multi domain social networks
by: Noor, Fozia, et al.
Published: (2015)
by: Noor, Fozia, et al.
Published: (2015)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)
by: Hamza, Aminu, et al.
Published: (2014)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
Selecting respondents for survey questionnaire in Islamic way
by: Shah, Asadullah, et al.
Published: (2017)
by: Shah, Asadullah, et al.
Published: (2017)
Log your car: The non-invasive vehicle forensics
by: Mansor, Hafizah, et al.
Published: (2016)
by: Mansor, Hafizah, et al.
Published: (2016)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
Development of a game for history course of secondary school students
by: Ghulamani, Sumbul, et al.
Published: (2017)
by: Ghulamani, Sumbul, et al.
Published: (2017)
Disparity between theory & practice beyond the worst-case competitive analysis
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Competitive algorithms for online conversion problems with interrelated prices
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
Identification of valued users to generate more telecom filigence
by: Khan, N., et al.
Published: (2018)
by: Khan, N., et al.
Published: (2018)
A model for real-time recognition and textual representation of Malaysian sign language through image processing
by: Karabasi, Mostafa, et al.
Published: (2013)
by: Karabasi, Mostafa, et al.
Published: (2013)
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
Sliding mode control for 2 degrees of freedom upper limb rehabilitation robotics system under uncertainties
by: Ahmed, Syed Faiz, et al.
Published: (2019)
by: Ahmed, Syed Faiz, et al.
Published: (2019)
Beyond traditional audits: the implications of information technology on auditing
by: Shaikh, Humaiz, et al.
Published: (2018)
by: Shaikh, Humaiz, et al.
Published: (2018)
Resolving ethical dilemma in technology enhanced education through smart mobile devices
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
Energy efficiency in virtualized data center
by: Karamat Khan, Tehmina, et al.
Published: (2018)
by: Karamat Khan, Tehmina, et al.
Published: (2018)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
Differential image compression for telemedicine: a novel approach
by: Khan, Adnan Alam, et al.
Published: (2011)
by: Khan, Adnan Alam, et al.
Published: (2011)
Similar Items
-
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016) -
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015) -
Offline printed Sindhi optical text recognition: survey
by: Solangi, Yasir Ali, et al.
Published: (2019) -
An applications development for record keeping of police stations in Pakistan
by: Shah, Abdul Salam, et al.
Published: (2015) -
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016)